DEV Community

Cover image for Nmap Subnet Scanning Tutorial: Network Reconnaissance for Beginners
Labby for LabEx

Posted on

Nmap Subnet Scanning Tutorial: Network Reconnaissance for Beginners

Introduction

MindMap

In this challenge, you'll apply your knowledge of network scanning using Nmap, a powerful and versatile tool used by cybersecurity professionals. Nmap is essential for discovering hosts, services, and potential vulnerabilities on a network. Your task is to perform a series of scans on a local network, demonstrating your understanding of Nmap's capabilities and interpreting the results.

Perform Network Scans

In this step, you'll use Nmap to scan a range of IP addresses and analyze the results.

Tasks

  • Use Nmap to scan the first 10 IP addresses in the 192.168.1.0/24 subnet.
  • Identify the number of active hosts in this range.
  • Determine which host is running a web server (HTTP).
  • Find a host with an SSH service running.

Requirements

  • Execute all commands from the ~/project directory.
  • Use appropriate Nmap options to scan for open ports and identify services.
  • Save the output of the scan to a file named scan_results.txt in the ~/project directory.

Example

After running the scan, your scan_results.txt file might contain output similar to this:



Starting Nmap 7.80 ( https://nmap.org )
Nmap scan report for 192.168.1.1
Host is up (0.0010s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http

Nmap scan report for 192.168.1.5
Host is up (0.0015s latency).
Not shown: 999 closed ports
PORT STATE SERVICE
22/tcp open ssh

Nmap done: 10 IP addresses (2 hosts up) scanned in 2.05 seconds

Enter fullscreen mode Exit fullscreen mode




Summary

In this challenge, you applied your knowledge of Nmap to perform a network scan on a range of IP addresses. You learned how to execute a basic Nmap scan, save the results to a file, and interpret the output to gather important information about the network.

This exercise reinforces the importance of network scanning in cybersecurity and system administration. By identifying active hosts and open services, you've simulated a common task performed by professionals to maintain network security and inventory.

Remember, in real-world scenarios, always ensure you have proper authorization before scanning any network. Unauthorized scanning can be illegal and unethical.


🚀 Practice Now: Scanning Subnet with Nmap


Want to Learn More?

Top comments (0)