Royal Military College of Canada

Department of Electrical and Computer Engineering

EEE473 Computer Network Design
Dr G.S. Knight
Dr S. Leblanc

Lab 6 Part 1 - Port Scanning with nmap

References


Introduction

This exercise is an introduction to one of the most well known port scanning tools, nmap. Students discover and scan hosts on the closed network within the RMC CNSl in room S4112.  The results of the host discovery section of this lab are used in the next exercise on vulnerability assessment.


Part 1 - Set up

Set up your lab environment according to the specifications below, and annotate Figure 1 accordingly.

Figure 1 - Exercise Network

 Figure 1 - Exercise Network


Part 2 - Introduction to nmap


Part 3 - Using nmap to conduct a reconnaissance of your network


Shutting Down

When you are finished with the exercise, do not shut down your virtual machines; you will use the same network setup in the next exercise.

Conclusion

In this exercise you have learned the usefulness of one of the most common utilities for exploring a network using port scans.  Specifically you have used the network port scanning tool nmap.  While you explored this tool using the Linux operating system, the same tool is available for Windows operating systems. Note that nmap also has a GUI front end named zenmap.

Part 2 of the lab includes vulnerability scanning.


Submit your lab report by e-mail. Place files together in a  zip file before sending. Include your report and network traffic dump files.