Nmap Scanning Project
Objective:
Identify the operating system, running services, and potential vulnerabilities on the target IP
192.168.88.123to understand its infrastructure and assess security measures.
Tools Used:
• Nmap (Network mapper)
• Kali Linux (running on VirtualBox)
• Target: local machine with IP [Link]
Methodology:
1. Ping Scan:
- Purpose: Verify if the target is active on the network.
- Command: nmap -sn [Link]
- Process: Sends ICMP echo requests to check if the host is up.
2. Port Scan:
I. To scan all 65535 ports
- Purpose: Identify open ports on the target system.
- Command: nmap -p- [Link]
- Process: Scans all 65535 ports for open or filtered states.
II. To scan multiple specific ports
- Purpose: Identify specific open ports on the target system
- Command: nmap -p 22,80,443 [Link]
- Process: Scans port no 22,80,443 ports for open or filtered states
III. To scan a range of ports
- Purpose: Identify the specific range of open ports on the target system.
- Command: nmap -p 1-1535 [Link]
- Process: Scans only port 1 to port 1535 for open or filtered states.
3. UDP Port Scan:
- Purpose: Discover open UDP ports on the target.
- Command: nmap -sU [Link]
- Process: Scans for active UDP-based services which are often missed by standard TCP
scans.
4. Service Version Detection:
- Purpose: Identify active services and their versions to understand the target's network
landscape.
- Command: nmap -sV [Link]
- Process: This command scans open ports and attempts to determine the version of
services running on them.
5. OS Detection:
- Purpose: Identify the target's operating system for further exploitation or system
analysis.
- Command: nmap -O [Link]
- Process: Uses TCP/IP stack fingerprinting to guess the operating system.
6. Firewall/IDS Detection:
- Purpose: Detect the presence of firewalls or intrusion detection systems (IDS) that may
block scanning attempts. –
- Command: nmap --script firewall-bypass [Link]
- Process: Executes scripts designed to identify and attempt to bypass firewall rules.
7. Aggressive Scan:
- Purpose: Perform a comprehensive scan combining service detection, OS detection, and
traceroute.
- Command: nmap -A [Link]
- Process: This command conducts a detailed assessment by combining multiple scanning
techniques.
8. Vulnerability Scan:
- Purpose: Identify known vulnerabilities in detected services.
- Command: nmap --script=vuln [Link]
- Process: Runs Nmap's vulnerability detection scripts to find potential weaknesses.
Findings:
1. Ping Scan (nmap -sn [Link])
- Host is up and reachable on the network.
2. Port Scan (nmap -p- [Link])
I. Port Scan (nmap -p- [Link])
- All 65,535 TCP ports are closed. No active services detected on any port.
II. Specific Port Scan (nmap -p 22,80,443 [Link])
- Common service ports (SSH, HTTP, HTTPS) are closed. No services are running on
ports 22, 80, or 443.
III. Port Range Scan (nmap -p 1-10000 [Link])
- Host is up with low latency. Port 8080/tcp is open and running http-proxy. All other
ports in the range are closed.
3. UDP Port Scan (nmap -sU [Link])
- Host is up with low latency. Ports 68/udp (dhcpc) and 3702/udp (ws-discovery) are
in an open|filtered state, meaning Nmap couldn't determine whether they are truly
open or just filtered by a firewall. All other 998 UDP ports are closed.
4. Service Version Detection (nmap -sV [Link])
- Host is up with low latency. Port 8080/tcp is open, running SimpleHTTPServer 0.6
(Python 3.12.7). All other scanned TCP ports are closed.
5. OS Detection (nmap -O [Link])
- Host is up with low latency. The device is running Linux 2.6.32. It is detected as a
general-purpose Linux system with the Linux kernel version 2.6.X. All other scanned
TCP ports are closed.
6. Firewall Bypass Script (nmap --script firewall-bypass [Link])
- Host seems down, possibly due to blocking ICMP (ping) requests or firewall
restrictions. To bypass this, use the -Pn option to assume the host is up. The scan
didn’t proceed as expected due to this network configuration.
7. Aggressive Scan (nmap -A [Link])
- Host is up (0.000067s latency).
- All 1000 TCP ports on [Link] are in ignored states.
- No open ports detected (all ports closed or filtered).
- OS Detection: Too many fingerprints match this host, unable to specify OS.
- Network Distance: 0 hops (localhost).
8. Vulnerability Scan (nmap --script=vuln [Link])
- Host is up (0.0000020s latency).
- All 1000 TCP ports on [Link] are in ignored states.
- No open ports detected (all ports closed or filtered).
- No vulnerabilities found (since no open ports were detected).