From Fedora Project Wiki
No edit summary
No edit summary
Line 10: Line 10:
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
# Rerun the some test and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans: set '''Target''' and '''Profile''' values then click on '''Scan'''.
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans: set '''Target''' and '''Profile''' values then click on '''Scan'''.



Revision as of 17:01, 31 May 2011

Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some tests and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans: set Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.