Preview

Nmap

Better Essays
Open Document
Open Document
703 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nmap
Title:- Network Scanning using NMAP in Windows
Exp.No:-1
Aim:- To study NMAP Software and demonstrate using various websites.
Theory:- Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

The output from Nmap is a list of scanned targets, with supplemental information on each depending on the options used. Key among that information is the “interesting ports table”. That table lists the port number and protocol, service name, and state. The state is either open, filtered, closed, or unfiltered. Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed. Closed ports have no application listening on them, though they could open up at any time. Ports are classified as unfiltered when they are responsive to Nmap's probes, but Nmap cannot determine whether they are open or closed. Nmap reports the state combinations open|filtered and closed|filtered when it cannot determine which of the two states describe a port. The port table may also include software version details when version detection has been requested. When an IP protocol scan is requested (-sO), Nmap provides information on supported IP protocols rather than

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2. Port scanning software’s goal is to detect unauthorized services being run by users. It is also used to check for possible security risks that could threaten the server or workstation.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Best Essays

    The aim of this essay is to investigate the two major theories trying to explain why do primates have large brains. Even since the seminar study of Jerison in 1973 it has been acknowledged that primate brains are unusually large for their body size. There are three main groups of theories giving more or less persuasive explanations of the evolution of large brains and high cognitive skills in primates. The first group is a group of social theories, postulating that primate cognition is a result of complex social interactions between individuals, and in this essay this group will be represented by the Social Brain Hypothesis proposed by British anthropologist Robin Dunbar. The second group encompasses the ecological theories that are based on a premise that primate intelligence originated from complex interactions with the environment. A “delegate” from this group in my discussion will be the Visual Specialisation Hypothesis introduced by Robert Barton (1998), who argues that primate encephalisation is connected to frugivorous diet and the need of advanced visual abilities. Finally, the Cultural Intelligence Hypothesis, which is a general name to multiple related views, proposes that large-brained primates possess “general intelligence” due to their great behavioural flexibility. This final theory will be included in the comparison just to offer an alternative view to the two mainly discussed theories above.…

    • 1957 Words
    • 8 Pages
    Best Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    One can use this information to create a policy of vulnerabilities that you want Nessus to scan for on that specific host.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Vulnerability scanners can help determine patching policy. Once we know what vulnerabilities are exposed, we can make decisions about what can and cannot be tolerated in the network environment. Knowing our typical network behavior can highlight common activity that we might want to stop via policy or other tools. Both of these technologies provide visibility into network traffic. Network risk mapping can find vulnerable data and network device configurations and help us prioritize which issues to resolve first. Data can be based on defined nodes, directly vulnerable hosts, non-secured configuration of network equipment, and the end users most susceptible compromises.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Windows 7 command-line utility that can tell you if the TCP/IP stack of another…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wireshark

    • 512 Words
    • 3 Pages

    Organizing a new government is not an easy task. You cannot make everyone happy because everyone has different views and opinions. No one person sees a topic the same as another person. So when coming up with a system for a new government for a country you have many decisions that must be made. There is a country that needs a new government: We will call this country Anation. Anation is a country that has several religious factions. “The interconnection between religion and government is inevitable because in varying degrees both institutions are involved in regulating social behavior (unknown, para 2).” Religion is an important factor to consider when creating a new government because people’s views are tied to their religious beliefs generally speaking. Setting up a new government system for Anation is a difficult and slow task.…

    • 512 Words
    • 3 Pages
    Good Essays

Related Topics