From Fedora Project Wiki

Description

This test case tests the ability of Nmap to scan a web server for known vulnerabilities.

Setup

  1. A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
  2. Adjust or shutdown the Firewall of the targets machines.
  3. Ensure the Package-x-generic-16.pngnmap, Package-x-generic-16.pngnmap-frontend packages are installed.

How to test

  1. Nmap hosts discovery: nmap -sP NETWORK/NETMASK
  2. Nmap port scanning: nmap NETWORK/NETMASK
  3. Nmap OS detection: nmap -O NETWORK/NETMASK
  4. Nmap version detection: nmap -sV NETWORK/NETMASK
  5. Rerun the some test and export the result to XML: nmap -sV -O -oX results.xml NETWORK/NETMASK
  6. Open Nmap front-end zenmap, then run the predefined scans: set Target and Profile values then click on Scan.

Expected Results

  1. You should see Nmap results.
  2. Nmap should export the results correctly.
  3. Nmap front-end Zenmap should run without crashes.