From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}} | # Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}} | ||
# Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}} | # Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}} | ||
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans | # Open Nmap front-end {{command |zenmap}}, then run the predefined scans by setting '''Target''' and '''Profile''' values then click on '''Scan'''. | ||
|results= | |results= |
Revision as of 17:05, 31 May 2011
Description
This test case tests the ability of Nmap to scan and discover various information on a network.
Setup
- A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
- Adjust or shutdown the Firewall of the targets machines.
- Ensure the
nmap
,nmap-frontend
packages are installed.
How to test
- Nmap hosts discovery:
nmap -sP NETWORK/NETMASK
- Nmap port scanning:
nmap NETWORK/NETMASK
- Nmap OS detection:
nmap -O NETWORK/NETMASK
- Nmap version detection:
nmap -sV NETWORK/NETMASK
- Rerun the some tests and export the result to XML:
nmap -sV -O -oX results.xml NETWORK/NETMASK
- Open Nmap front-end
zenmap
, then run the predefined scans by setting Target and Profile values then click on Scan.
Expected Results
- You should see Nmap results.
- Nmap should export the results correctly.
- Nmap front-end Zenmap should run without crashes.