From Fedora Project Wiki
No edit summary |
No edit summary |
||
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{QA/Test_Case | {{QA/Test_Case | ||
|description=This test case tests the ability of Nmap to scan a | |description=This test case tests the ability of Nmap to scan and discover various information on a network. | ||
|setup= | |setup= | ||
# A network of servers with different network services is required, | # A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format. | ||
# Adjust or shutdown the Firewall of the targets machines. | # Adjust or shutdown the Firewall of the targets machines. | ||
# Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | # Ensure the {{package|nmap}}, {{package|nmap-frontend}} packages are installed. | ||
Line 10: | Line 10: | ||
# Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}} | # Nmap OS detection: {{command |nmap -O NETWORK/NETMASK}} | ||
# Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}} | # Nmap version detection: {{command |nmap -sV NETWORK/NETMASK}} | ||
# Rerun the some | # Rerun the some tests and export the result to XML: {{command |nmap -sV -O -oX results.xml NETWORK/NETMASK}} | ||
# Open Nmap front-end | # Open Nmap front-end {{command |zenmap}}, then run the predefined scans by setting '''Target''' and '''Profile''' values then click on '''Scan'''. | ||
|results= | |results= | ||
Line 18: | Line 18: | ||
# Nmap front-end Zenmap should run without crashes. | # Nmap front-end Zenmap should run without crashes. | ||
}} | }} | ||
Latest revision as of 18:41, 31 May 2011
Description
This test case tests the ability of Nmap to scan and discover various information on a network.
Setup
- A network of servers with different network services is required, NETWORK/NETMASK in tests refers to CIDR format.
- Adjust or shutdown the Firewall of the targets machines.
- Ensure the
nmap
,nmap-frontend
packages are installed.
How to test
- Nmap hosts discovery:
nmap -sP NETWORK/NETMASK
- Nmap port scanning:
nmap NETWORK/NETMASK
- Nmap OS detection:
nmap -O NETWORK/NETMASK
- Nmap version detection:
nmap -sV NETWORK/NETMASK
- Rerun the some tests and export the result to XML:
nmap -sV -O -oX results.xml NETWORK/NETMASK
- Open Nmap front-end
zenmap
, then run the predefined scans by setting Target and Profile values then click on Scan.
Expected Results
- You should see Nmap results.
- Nmap should export the results correctly.
- Nmap front-end Zenmap should run without crashes.