Maxamillion (talk | contribs) (Created page with 'This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on [https://fedorahosted.org/security-spin/wiki/availableApps Available Apps.] ==...') |
(→Nmap) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 14: | Line 14: | ||
| Scan Bar with Foo | | Scan Bar with Foo | ||
| Output of information about Bar | | Output of information about Bar | ||
|- | |||
|} | |||
=== Nmap === | |||
The basics of nmap: | |||
nmap <options> <host> | |||
For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do | |||
nmap -T5 -O 127.0.0.1 | |||
and it would return something along the lines of | |||
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time | |||
Nmap scan report for localhost.color.net (127.0.0.1) | |||
Host is up. | |||
PORT STATE SERVICE | |||
22/tcp open tellnet | |||
80/tcp open http | |||
OS details: Microsoft Windows XP SP2 or SP3 | |||
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds | |||
Basic commands | |||
{| class="wikitable sortable" border="1" | |||
! Argument !! Result | |||
|- | |||
| -T (1-5) | |||
| Tells nmap the amount of time/intensity | |||
|- | |||
| -O | |||
| Designates operating system detection | |||
|- | |||
| -p<port number> | |||
| tells nmap to scan only selected ports | |||
|- | |||
| -F | |||
| tells nmap to only scan ports listed in the nmap-services file | |||
|- | |- | ||
|} | |} |
Latest revision as of 01:14, 19 February 2010
This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on Available Apps.
How to use this page
Provide a test case and add a heading in order to keep a running outline of the test cases and we can use them to format into an actual Quality Assurance plan at a later date.
Example:
Foo package test case
- Quick note on how to use Foo
RTest Case | Expected Result |
---|---|
Scan Bar with Foo | Output of information about Bar |
Nmap
The basics of nmap:
nmap <options> <host>
For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do
nmap -T5 -O 127.0.0.1
and it would return something along the lines of
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time
Nmap scan report for localhost.color.net (127.0.0.1)
Host is up.
PORT STATE SERVICE
22/tcp open tellnet 80/tcp open http
OS details: Microsoft Windows XP SP2 or SP3 OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds
Basic commands
Argument | Result |
---|---|
-T (1-5) | Tells nmap the amount of time/intensity |
-O | Designates operating system detection |
-p<port number> | tells nmap to scan only selected ports |
-F | tells nmap to only scan ports listed in the nmap-services file |