From Fedora Project Wiki
No edit summary
No edit summary
Line 1: Line 1:
{{QA/Test_Case
{{QA/Test_Case
|description=This test case tests the ability of Nmap to scan a web server for known vulnerabilities.
|description=This test case tests the ability of Nmap to scan and discover various information on a network.
|setup=
|setup=
# A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
# A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.

Revision as of 17:03, 31 May 2011

Description

This test case tests the ability of Nmap to scan and discover various information on a network.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some tests and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans: set Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.