Scanning Methodology — A Roadmap
This guide gives you a quick end-to-end roadmap of pen-test activity using nmap.
To Whom It Concern: This article is for beginners in the cybersecurity domain who wants to get a quick practical guide on Pen Testing systems via the nmap.
First thing first, you will need a Network exploration tool and security/port scanner. We will be using the nmap tool. If you don’t have Nmap installed, you can get it from here. It’s free…!
We can use both Graphical version or via terminal.
Methodology
1. Check for Live Systems
We have to search for any live systems present in our scope environment. We will perform a sweep over a network.
nmap -sP 192.168.205.1/24
2. Check for Open Ports
The next task to be done would be to do a port scanning to obtain information about open ports running on the system. Choose a specific host. We will get to know the port details and services running over them.
nmap 192.168.254.249
3. Perform Banner Grabbing
Banner Grabbing is one of the several techniques used to discover the type and/or version of the software in use.
Version Detection
The enable version detection the “-sV” switch is used.
nmap -sV 192.168.254.249
Operating System Detection:
To enable operating system detection, the “-O” switch is used.
nmap -O 192.168.205.249
Alternatively, you can use the -A argument to perform an aggressive scan. It enables OS detection, version detection, and other services.
nmap -A 192.168.205.249
4. Vulnerability Scan
The next step is to determine the vulnerability that exists in the host.
nmap --script vuln 192.168.205.249
Nmap Scripting Engine (NSE) Script is one of the most popular and powerful capabilities of Nmap. These Nmap vulnerability scan scripts are used by penetration testers and hackers to examine common known vulnerabilities.
NSE scripts are classified according to a set of predetermined categories to which each script belongs. Authentication, broadcast, brute force, intrusive, malware, safe, version, and vuln are some of the categories. You can find all the category types of NSE scripts and their phases here.
It makes your life easier since you can find an existing vulnerability from the Common Vulnerabilities and Exploits (CVE) database for a particular version of the service.
The running applications/services are prone to those vulnerabilities. Further details can be found in vulnerability databases.
Vulnerability Databases:
5. Penetration Testing Report
It’s time to write down the findings. A few headings to be addressed in a Pen-test report are as follows;
You can find out several sample penetration testing reports online. Details for pen-test report content can be found on SANS “https://www.sans.org/white-papers/33343/”.
Recommended by LinkedIn
SecOps | Web Developer | Digital Literacy
Share your ideas with millions of readers.
Love podcasts or audiobooks? Learn on the go with our new app.
Keep it up.
Nice work