Scanning Methodology — A Roadmap

Scanning Methodology — A Roadmap

This guide gives you a quick end-to-end roadmap of pen-test activity using nmap.

To Whom It Concern: This article is for beginners in the cybersecurity domain who wants to get a quick practical guide on Pen Testing systems via the nmap.

First thing first, you will need a Network exploration tool and security/port scanner. We will be using the nmap tool. If you don’t have Nmap installed, you can get it from here. It’s free…!

We can use both Graphical version or via terminal.

Methodology

  1. Look for Live Systems
  2. Check for Open Ports
  3. Banner Grabbing
  4. Vulnerability Scan
  5. Penetration Test Report

1. Check for Live Systems

We have to search for any live systems present in our scope environment. We will perform a sweep over a network.

nmap -sP 192.168.205.1/24        
No alt text provided for this image

  • Now, we have a total of 6 hosts that are Up out of 256 IP address sweep.

2. Check for Open Ports

The next task to be done would be to do a port scanning to obtain information about open ports running on the system. Choose a specific host. We will get to know the port details and services running over them.


nmap 192.168.254.249        
No alt text provided for this image

  • A total of 6 open ports are found, and we can see service running on them also.

3. Perform Banner Grabbing

Banner Grabbing is one of the several techniques used to discover the type and/or version of the software in use.

Version Detection

The enable version detection the “-sV” switch is used.


nmap -sV 192.168.254.249        
No alt text provided for this image

  • It’s getting interested now, we got to know the Application names & their version also.

Operating System Detection:

To enable operating system detection, the “-O” switch is used.


nmap -O 192.168.205.249        
No alt text provided for this image

  • The operating system on this host is found to as Windows 10.

Alternatively, you can use the -A argument to perform an aggressive scan. It enables OS detection, version detection, and other services.


nmap -A 192.168.205.249        
No alt text provided for this image

4. Vulnerability Scan

The next step is to determine the vulnerability that exists in the host.


nmap --script vuln 192.168.205.249        
Nmap Scripting Engine (NSE) Script is one of the most popular and powerful capabilities of Nmap. These Nmap vulnerability scan scripts are used by penetration testers and hackers to examine common known vulnerabilities.

NSE scripts are classified according to a set of predetermined categories to which each script belongs. Authentication, broadcast, brute force, intrusive, malware, safe, version, and vuln are some of the categories. You can find all the category types of NSE scripts and their phases here.

It makes your life easier since you can find an existing vulnerability from the Common Vulnerabilities and Exploits (CVE) database for a particular version of the service.

No alt text provided for this image

  • So we can see several vulnerability codes: CVE-2012–1182, CVE-2007–6750.

The running applications/services are prone to those vulnerabilities. Further details can be found in vulnerability databases.

Vulnerability Databases:

  1. https://cve.mitre.org/cve/search_cve_list.html
  2. https://www.cvedetails.com/
  3. https://nvd.nist.gov/vuln/search
  4. https://vuldb.com/?search

5. Penetration Testing Report

It’s time to write down the findings. A few headings to be addressed in a Pen-test report are as follows;

  • Summary: Summaries the report content in small paragraphs; statement of tasks accomplished, methodology used, high-level findings and recommendations.
  • Scope of Work: Includes IP addresses tested, and type of pen test performed. Duration in which activity was carried.
  • Project Objective: What organization can achieve after knowing & mitigating risk.
  • Details of Finding: Count of discovered risks, based on priorities. For each finding, describe the threat level, vulnerability rating, and impact.
  • Recommendations: Present the solutions, mitigations, or other suggestions for reducing/eliminating the vulnerability.

You can find out several sample penetration testing reports online. Details for pen-test report content can be found on SANS “https://www.sans.org/white-papers/33343/”.








More from Rumman Khan


SecOps | Web Developer | Digital Literacy

Jul 20

Organization Password Policy: A Practical Hardening Guide

Passwords are the front-line defense of user accounts. A poorly chosen password may lead to a big disaster. Therefore, every person is responsible for taking the appropriate steps, as outlined below, to select and secure their password. To Whom It Concern: This article is for anyone who want to get…

Information Security

4 min read





Share your ideas with millions of readers.

Write on Medium

Dec 6, 2019

Software Requirements Engineering: What, Why, Who, When, and How

If software requirement is not right, companies will not end-up with software they need. So it is necessary to find out the what, why, who, when, and how of the system. — This article will discuss: • What: The various levels and types of requirements that need to be defined • Why: The benefits of having the right software requirements • Who: The stakeholders of the software requirements and getting them involved in the process • When: Requirements activities throughout the software development life…

Agile

6 min read




Jul 6, 2019

Basics of BASH for Beginners

Learn about the basic BASH practices. — Who Should Read This Document The document is intended for readers who might be interested in: Programming in BASH This document introduces the basics of Bash programming. This document isn’t for newbie, it assumes one have some prior knowledge of programming language. Organization of This Document The following chapters covers the loops and conditional statements.

Terminal

3 min read




Jun 26, 2019

Hello World — Your first program (BASH Programming Guide)

The following procedure creates a BASH version of “Hello World!” program. The program displays the string Hello World! To create and run a script on terminal In Linux, on the Start menu, search for Terminal, and then choose terminal, as shown in figure.

Programming

2 min read




Jun 18, 2019

Operating System-Part1 : Intro to OS

What is Operating System? An operating system(OS) is a software which acts as an interface between the end user and computer hardware. So basically operating system is responsible for managing resources of a computer system, and provides the tools that applications need to operate. Operating systems are built out of…

Programming

3 min read





Love podcasts or audiobooks? Learn on the go with our new app.

Try Knowable

To view or add a comment, sign in

Others also viewed

Explore content categories