No edit summary |
(→Nmap) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 20: | Line 20: | ||
The basics of nmap: | The basics of nmap: | ||
nmap <options> <host> | |||
For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do | For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do | ||
nmap -T5 -O 127.0.0.1 | |||
and it would return something along the lines of | and it would return something along the lines of | ||
Line 30: | Line 30: | ||
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time | Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time | ||
Nmap scan report for localhost.color.net (127.0.0.1) | Nmap scan report for localhost.color.net (127.0.0.1) | ||
Host is up. | Host is up. | ||
PORT STATE SERVICE | PORT STATE SERVICE | ||
22/tcp open tellnet | 22/tcp open tellnet | ||
80/tcp open http | 80/tcp open http | ||
OS details: Microsoft Windows XP SP2 or SP3 | OS details: Microsoft Windows XP SP2 or SP3 | ||
OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . | OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . | ||
Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds | Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds | ||
Line 59: | Line 53: | ||
| -p<port number> | | -p<port number> | ||
| tells nmap to scan only selected ports | | tells nmap to scan only selected ports | ||
|- | |||
| -F | |||
| tells nmap to only scan ports listed in the nmap-services file | |||
|- | |- | ||
|} | |} |
Latest revision as of 01:14, 19 February 2010
This page is for brainstorming a Quality Assurance plan for the upcoming SecuritySpin based on Available Apps.
How to use this page
Provide a test case and add a heading in order to keep a running outline of the test cases and we can use them to format into an actual Quality Assurance plan at a later date.
Example:
Foo package test case
- Quick note on how to use Foo
RTest Case | Expected Result |
---|---|
Scan Bar with Foo | Output of information about Bar |
Nmap
The basics of nmap:
nmap <options> <host>
For example if you want to do an light scan of <host> that returns the open ports and operating system of <host>, where <host> is 127.0.0.1 you would do
nmap -T5 -O 127.0.0.1
and it would return something along the lines of
Starting Nmap 5.21 ( http://nmap.org ) at 2010-02-18 18:49 Central Standard Time
Nmap scan report for localhost.color.net (127.0.0.1)
Host is up.
PORT STATE SERVICE
22/tcp open tellnet 80/tcp open http
OS details: Microsoft Windows XP SP2 or SP3 OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.11 seconds
Basic commands
Argument | Result |
---|---|
-T (1-5) | Tells nmap the amount of time/intensity |
-O | Designates operating system detection |
-p<port number> | tells nmap to scan only selected ports |
-F | tells nmap to only scan ports listed in the nmap-services file |