From Fedora Project Wiki

Tests

  1. port scanning
  2. OS detection
  3. version detection
  4. script scanning
  5. traceroute


Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, CIDR format: NETWORK/NETMASK.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap Port scan functionality: nmap NETWORK/NETMASK
  2. Nmap OS detection functionality: nmap -O NETWORK/NETMASK
  3. Version detection functionality: nmap -sV NETWORK/NETMASK
  4. Rerun the test above and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the result correctly.