From Fedora Project Wiki
No edit summary
No edit summary
Line 1: Line 1:
=== Tests===
# port scanning
# OS detection
# version detection
# script scanning
# traceroute
{{QA/Test_Case
{{QA/Test_Case
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
Line 13: Line 6:
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed.
|actions=  
|actions=  
# Nmap Port scan functionality: {{command |nmap NETWORK/NETMASK}}
# Nmap hosts discovery: {{command |nmap -sP NETWORK/NETMASK}}
# Nmap OS detection functionality: {{command |nmap -O NETWORK/NETMASK}}
# Nmap port scanning: {{command |nmap NETWORK/NETMASK}}
# Version detection functionality: {{command |nmap -sV NETWORK/NETMASK}}
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}}
# Rerun the test above and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}}
#  
# Rerun the some test and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}}
# Open Nmap front-end Zenmap {{command |zenmap}}, then run the predefined scans: set '''Target'' and '''Profile''' values then click on '''Scan'''.


|results=
|results=
# You should see Nmap results.
# You should see Nmap results.
# Nmap should export the result correctly.
# Nmap should export the results correctly.
# Nmap front-end Zenmap should run without crashes.
}}
}}


[[Category:Test Cases]]
[[Category:Test Cases]]
[[Category:Security Lab]]
[[Category:Security Lab]]

Revision as of 16:58, 31 May 2011

Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some test and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end Zenmap zenmap, then run the predefined scans: set Target and Profile' values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.