From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
# script scanning | # script scanning | ||
# traceroute | # traceroute | ||
{{QA/Test_Case | |||
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities. | |||
|setup= | |||
# A network of servers with different network services is required, CIDR format: NETWORK/NETMASK. | |||
# Adjust or shutdown the Firewall of the targets machines. | |||
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | |||
|actions= | |||
# Nmap Port scan functionality: {{command |nmap NETWORK/NETMASK}} | |||
# Nmap OS detection functionality: {{command |nmap -O NETWORK/NETMASK}} | |||
# Version detection functionality: {{command |nmap -sV NETWORK/NETMASK}} | |||
# Rerun the test above and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}} | |||
# | |||
|results= | |||
# You should see Nmap results. | |||
# Nmap should export the result correctly. | |||
}} | |||
[[Category:Test Cases]] | |||
[[Category:Security Lab]] |
Revision as of 16:41, 31 May 2011
Tests
- port scanning
- OS detection
- version detection
- script scanning
- traceroute
Description
This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
Setup
- A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
- Adjust or shutdown the Firewall of the targets machines.
- Ensure the
nmap
,nmap-frontend
packages are installed.
How to test
- Nmap Port scan functionality:
nmap NETWORK/NETMASK
- Nmap OS detection functionality:
nmap -O NETWORK/NETMASK
- Version detection functionality:
nmap -sV NETWORK/NETMASK
- Rerun the test above and export the result to XML:
nmap -sV -O -oX results.xml NETWORK/NETMASK
Expected Results
- You should see Nmap results.
- Nmap should export the result correctly.