From Fedora Project Wiki

(Created page with 'This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on [https://fedorahosted.org/security-spin/wiki/availableApps Available Apps.] ==...')
 
Line 14: Line 14:
 
| Scan Bar with Foo
 
| Scan Bar with Foo
 
| Output of information about Bar
 
| Output of information about Bar
 +
|-
 +
|}
 +
 +
=== Nmap ===
 +
The basics of nmap:
 +
 +
#nmap <options> <host>
 +
 +
For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do
 +
 +
#nmap -T5 -O 127.0.0.1
 +
 +
and it would return something along the lines of
 +
 +
 +
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time
 +
 +
Nmap scan report for localhost.color.net (127.0.0.1)
 +
 +
Host is up.
 +
 +
PORT      STATE  SERVICE
 +
 +
22/tcp    open    tellnet
 +
 +
80/tcp    open    http 
 +
 +
OS details: Microsoft Windows XP SP2 or SP3
 +
 +
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
 +
 +
Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds
 +
 +
Basic commands
 +
{| class="wikitable sortable" border="1"
 +
! Argument !! Result
 +
|-
 +
| -T (1-5)
 +
| Tells nmap the amount of time/intensity
 +
|-
 +
| -O
 +
| Designates operating system detection
 +
|-
 +
| -p<port number>
 +
| tells nmap to scan only selected ports
 
|-
 
|-
 
|}
 
|}

Revision as of 01:09, 19 February 2010

This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on Available Apps.

How to use this page

Provide a test case and add a heading in order to keep a running outline of the test cases and we can use them to format into an actual Quality Assurance plan at a later date.

Example:

Foo package test case

- Quick note on how to use Foo

RTest Case Expected Result
Scan Bar with Foo Output of information about Bar

Nmap

The basics of nmap:

  1. nmap <options> <host>

For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do

  1. nmap -T5 -O 127.0.0.1

and it would return something along the lines of


Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time

Nmap scan report for localhost.color.net (127.0.0.1)

Host is up.

PORT STATE SERVICE

22/tcp open tellnet

80/tcp open http

OS details: Microsoft Windows XP SP2 or SP3

OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .

Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds

Basic commands

Argument Result
-T (1-5) Tells nmap the amount of time/intensity
-O Designates operating system detection
-p<port number> tells nmap to scan only selected ports