From Fedora Project Wiki

The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Description

This test case tests the ability of Nmap to scan and discover various information on a network.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the same tests and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans by setting Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.