From Fedora Project Wiki
No edit summary
No edit summary
 
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
=== Tests===
{{QA/Test_Case
# port scanning
|description=This test case tests the ability of Nmap to scan and discover various information on a network.
# OS detection
|setup=
# version detection
# A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
# script scanning
# Adjust or shutdown the Firewall of the targets machines.
# traceroute
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.
|actions=  
# Nmap hosts discovery: {{command |nmap -sP NETWORK/NETMASK}}
# Nmap port scanning: {{command |nmap NETWORK/NETMASK}}
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
# Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Open Nmap front-end {{command |zenmap}}, then run the predefined scans by setting '''Target''' and '''Profile''' values then click on '''Scan'''.
 
|results=
# You should see Nmap results.
# Nmap should export the results correctly.
# Nmap front-end Zenmap should run without crashes.
}}

Latest revision as of 18:41, 31 May 2011

Description

This test case tests the ability of Nmap to scan and discover various information on a network.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some tests and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans by setting Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.