From Fedora Project Wiki

(categorize correctly)
(corrected typo)
 
Line 10: Line 10:
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
# Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Rerun the same tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans by setting '''Target''' and '''Profile''' values then click on '''Scan'''.
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans by setting '''Target''' and '''Profile''' values then click on '''Scan'''.
|results=
|results=

Latest revision as of 08:01, 26 June 2011

Description

This test case tests the ability of Nmap to scan and discover various information on a network.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the same tests and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans by setting Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.