From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities. | |description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities. | ||
|setup= | |setup= | ||
# A network of servers with different network services is required, | # A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format. | ||
# Adjust or shutdown the Firewall of the targets machines. | # Adjust or shutdown the Firewall of the targets machines. | ||
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | # Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. |
Revision as of 17:01, 31 May 2011
Description
This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
Setup
- A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
- Adjust or shutdown the Firewall of the targets machines.
- Ensure the
nmap
,nmap-frontend
packages are installed.
How to test
- Nmap hosts discovery:
nmap -sP NETWORK/NETMASK
- Nmap port scanning:
nmap NETWORK/NETMASK
- Nmap OS detection:
nmap -O NETWORK/NETMASK
- Nmap version detection:
nmap -sV NETWORK/NETMASK
- Rerun the some test and export the result to XML:
nmap -sV -O -oX results.xml NETWORK/NETMASK
- Open Nmap front-end
zenmap
, then run the predefined scans: set Target and Profile values then click on Scan.
Expected Results
- You should see Nmap results.
- Nmap should export the results correctly.
- Nmap front-end Zenmap should run without crashes.