Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Register to 4Geeks

← Back to Projects

Scan ports with nmap

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

🌱 How to start a project?
  • Requirements

🌱 How to start a project?

In this practice, we will learn how to use Nmap, a widely recognized open-source tool for network analysis and security. With Nmap, we will perform scans on a target machine (in this case, a Debian machine) from a Kali Linux machine.

We will identify active hosts, open ports on the network, and which services are operating on those ports. This will allow us to search for possible vulnerabilities in the detected services and understand the security weaknesses that may exist in the network.

Requirements

  • Virtual machine with Kali Linux (Scannig machine)
  • Virtual machine with Debian (Target machine)

📝 Instructions

  • Open this URL and fork the repository https://github.com/breatheco-de/scan-with-nmap-practic

fork button

A new repository will be created in your account.

  • Clone the newly created repository into your localhost computer.
  • Once you have cloned successfully, follow the steps below carefully, one by one.

Step 1: Scanning with Nmap

On the Kali machine, we will perform a scan with Nmap to discover active hosts and open ports on a network or a specific device.

1sudo apt-get install nmap
1nmap <IP_debian>

Step 2: Enumerate Ports and Verify Services

After performing the scan, Nmap will provide a list of open ports and the services operating on those ports.

1nmap -sV <debian_IP>

This option (-sV) allows detection of the version of the service operating on each port.

1nmap -sV --script=vuln <debian_IP>

The option (--script=vuln) runs Nmap's built-in vulnerability detection scripts.

Step 3: Document Vulnerabilities Associated with Services

💡Example: For the Apache 2.4.7 service, go to the NVD page: https://nvd.nist.gov/ and enter "Apache 2.4.7" in the search bar.

vulnerability report

Delivery

  • In the root of the forked project, upload the report in .pdf format with the name vulnerability-report.pdf.

Signup and get access to similar projects

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Signup and get access to similar projects

We will use it to give you access to your account.
Already have an account? Login here.

By signing up, you agree to the Terms and conditions and Privacy policy.

Difficulty

  • intermediate

Average duration

2 hrs

Technologies

Difficulty

  • intermediate

Average duration

2 hrs

Technologies