From Fedora Project Wiki

The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on Available Apps.

How to use this page

Provide a test case and add a heading in order to keep a running outline of the test cases and we can use them to format into an actual Quality Assurance plan at a later date.

Example:

Foo package test case

- Quick note on how to use Foo

RTest Case Expected Result
Scan Bar with Foo Output of information about Bar

Nmap

The basics of nmap:

nmap <options> <host>

For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do

nmap -T5 -O 127.0.0.1

and it would return something along the lines of


Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time Nmap scan report for localhost.color.net (127.0.0.1) Host is up. PORT STATE SERVICE

22/tcp open tellnet 80/tcp open http

OS details: Microsoft Windows XP SP2 or SP3 OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds

Basic commands

Argument Result
-T (1-5) Tells nmap the amount of time/intensity
-O Designates operating system detection
-p<port number> tells nmap to scan only selected ports
-F tells nmap to only scan ports listed in the nmap-services file