Open Access Open Access  Restricted Access Subscription Access

A Systematic Method for Network Scanning in Penetration Testing Using NMap

Dr. Harish Joshi, Prof. Uzma Kausar, Prof. Ashok Bawge, Adiba Unwaan, Khadija Abdul Moiz

Abstract


This paper aims to carry out the key stages involved in penetration testing. It will follow the standard phases such as information gathering, vulnerability assessment, and exploitation using specialized penetration testing tools. The testing approach is black-box, meaning only the target machine's IP address is known in advance. It’s important to understand the role of NMAP in this process. NMAP is a versatile tool used in multiple stages of penetration testing not only for information gathering and enumeration but also for identifying vulnerabilities and acting as a security scanner. It is a powerful, multi-functional utility compatible with various operating systems, including Windows, Linux, BSD, and Mac.


Full Text:

PDF

References


E. S. Schetina, K. Green and J. Carlson, "Internet Site Security", 2002, pp. 400-417. (Book style).

McNab,"Network Security Assessment", Know Your Network, Paperback, Nov. 8, 2007, pp. 50-55. (Book style).

Maynor,"Metasploit Toolkit" for Penetration Testing, Exploit Development, and Vulnerability Research, 1st Edition, 18 Sep. 2007, pp. 350. (Book style).

P. Engebretson,"The Basics of Hacking and Penetration Testing", 2011. (Google Books, General Internet site).

J. O'Gorman, D. Kearns, D. Kennedy and M. Aharoni "Metasploit - The Penetration Tester's Guide", July 2011, pp. 328, ISBN: 978-59327-288-3. (Book style).

W. Pritchett and D. D. Smet,"Backtrack 5 Cookbook", Paperback, 21 Dec. 2012, pp. 45-47. (Book style).


Refbacks

  • There are currently no refbacks.