From Fedora Project Wiki

This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on Available Apps.

How to use this page

Provide a test case and add a heading in order to keep a running outline of the test cases and we can use them to format into an actual Quality Assurance plan at a later date.


Foo package test case

- Quick note on how to use Foo

RTest Case Expected Result
Scan Bar with Foo Output of information about Bar


The basics of nmap:

nmap <options> <host>

For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is you would do

nmap -T5 -O

and it would return something along the lines of

Starting Nmap 5.21 ( ) at 2010-02-18 18:49 Central Standard Time Nmap scan report for ( Host is up. PORT STATE SERVICE

22/tcp open tellnet 80/tcp open http

OS details: Microsoft Windows XP SP2 or SP3 OS detection performed. Please report any incorrect results at . Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds

Basic commands

Argument Result
-T (1-5) Tells nmap the amount of time/intensity
-O Designates operating system detection
-p<port number> tells nmap to scan only selected ports
-F tells nmap to only scan ports listed in the nmap-services file