From Fedora Project Wiki
No edit summary
No edit summary
Line 5: Line 5:
# script scanning
# script scanning
# traceroute
# traceroute
{{QA/Test_Case
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
|setup=
# A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
# Adjust or shutdown the Firewall of the targets machines.
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.
|actions=
# Nmap Port scan functionality: {{command |nmap NETWORK/NETMASK}}
# Nmap OS detection functionality: {{command |nmap -O NETWORK/NETMASK}}
# Version detection functionality: {{command |nmap -sV NETWORK/NETMASK}}
# Rerun the test above and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
#
|results=
# You should see Nmap results.
# Nmap should export the result correctly.
}}
[[Category:Test Cases]]
[[Category:Security Lab]]

Revision as of 16:41, 31 May 2011

Tests

  1. port scanning
  2. OS detection
  3. version detection
  4. script scanning
  5. traceroute


Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap Port scan functionality: nmap NETWORK/NETMASK
  2. Nmap OS detection functionality: nmap -O NETWORK/NETMASK
  3. Version detection functionality: nmap -sV NETWORK/NETMASK
  4. Rerun the test above and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the result correctly.