From Fedora Project Wiki
No edit summary
No edit summary
Line 2: Line 2:
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
|setup=
|setup=
# A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
# A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
# Adjust or shutdown the Firewall of the targets machines.
# Adjust or shutdown the Firewall of the targets machines.
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.

Revision as of 17:01, 31 May 2011

Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some test and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans: set Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.