From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{QA/Test_Case | {{QA/Test_Case | ||
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities. | |description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities. | ||
Line 13: | Line 6: | ||
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | # Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | ||
|actions= | |actions= | ||
# Nmap | # Nmap hosts discovery: {{command |nmap -sP NETWORK/NETMASK}} | ||
# Nmap OS detection | # Nmap port scanning: {{command |nmap NETWORK/NETMASK}} | ||
# | # Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}} | ||
# Rerun the test | # Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}} | ||
# | # Rerun the some test and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}} | ||
# Open Nmap front-end Zenmap {{command |zenmap}}, then run the predefined scans: set '''Target'' and '''Profile''' values then click on '''Scan'''. | |||
|results= | |results= | ||
# You should see Nmap results. | # You should see Nmap results. | ||
# Nmap should export the | # Nmap should export the results correctly. | ||
# Nmap front-end Zenmap should run without crashes. | |||
}} | }} | ||
[[Category:Test Cases]] | [[Category:Test Cases]] | ||
[[Category:Security Lab]] | [[Category:Security Lab]] |
Revision as of 16:58, 31 May 2011
Description
This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
Setup
- A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
- Adjust or shutdown the Firewall of the targets machines.
- Ensure the
nmap
,nmap-frontend
packages are installed.
How to test
- Nmap hosts discovery:
nmap -sP NETWORK/NETMASK
- Nmap port scanning:
nmap NETWORK/NETMASK
- Nmap OS detection:
nmap -O NETWORK/NETMASK
- Nmap version detection:
nmap -sV NETWORK/NETMASK
- Rerun the some test and export the result to XML:
nmap -sV -O -oX results.xml NETWORK/NETMASK
- Open Nmap front-end Zenmap
zenmap
, then run the predefined scans: set Target and Profile' values then click on Scan.
Expected Results
- You should see Nmap results.
- Nmap should export the results correctly.
- Nmap front-end Zenmap should run without crashes.