Cyber Security
(PCMC3030T)
TA Activity
ReportOn
“Find Network Vulnerabilities of www.wikipidia .com
website using Nmap”
Submitted By
Priyanka Anil Pandit (232121007)
Pooja Rajput (232121009)
Under the Guidance of
Pro. H.O.Borase
Department of Master of Computer
Application
The Shirpur Education Society’s
R. C. Patel Institute of Technology, Shirpur - 425405.
[2024-25]
Index
1. What is Nmap?
2. Nmap Scan Types
3. Which Scan type used and why
4. Nmap Output
Conclusion
What is Nmap?
Nmap (Network Mapper) is an open-source tool designed for network
discovery and security auditing. It allows users to discover hosts and services
on a computer network by sending packets and analyzing the responses.
Nmap is widely used for various tasks, including:
• Network inventory
• Managing service upgrade schedules
• Monitoring host or service uptime
• Security auditing and vulnerability assessment
Nmap Scan Types
Nmap offers various scan types, each serving different purposes. Some
common scan types include:
1. TCP Connect Scan (-sT): This is a straightforward method that
completes the TCP handshake. It’s easy to detect and can be blocked by
firewalls.
2. SYN Scan (-sS): This stealth scan sends SYN packets and analyzes
the response without completing the handshake. It’s faster and less
detectable.
3. UDP Scan (-sU): This scan probes for open UDP ports, which can be
challenging due to the nature of UDP.
4. ACK Scan (-sA): Used to map out firewall rules and determine which
ports are filtered.
5. Null Scan (-sN): Sends packets with no flags set, useful for evading
some intrusion detection systems.
6. FIN Scan (-sF): Sends FIN packets to identify open ports, often
bypassing firewalls.
7. Xmas Scan (-sX): Sends packets with the FIN, URG, and PUSH flags
set, used to probe for open ports.
Which Scan Type to Use and Why
For assessing a website like www.wikipedia.com, a SYN Scan (-sS) would
be ideal for the following reasons:
• Stealth: It’s less likely to trigger security alerts compared to a TCP
Connect Scan.
• Speed: SYN scans are generally faster because they don't establish a
full connection.
• Effectiveness: It’s effective for identifying open TCP ports, which can
help in assessing service exposure.
Nmap Output:-
Starting Nmap 7.95 ( https://nmap.org ) at 2024-09-23 17:10 India Standard
Time NSE: Loaded 157 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Initiating Ping Scan at 17:10
Scanning www.wikipidia.com (103.102.166.226) [4 ports]
Completed Ping Scan at 17:10, 0.11s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 17:10
Completed Parallel DNS resolution of 1 host. at 17:10, 0.09s elapsed
Initiating SYN Stealth Scan at 17:10
Scanning www.wikipidia.com (103.102.166.226) [1000 ports]
Discovered open port 80/tcp on 103.102.166.226
Discovered open port 443/tcp on 103.102.166.226
Discovered open port 2000/tcp on 103.102.166.226
Discovered open port 8010/tcp on 103.102.166.226
Discovered open port 5060/tcp on 103.102.166.226
Completed SYN Stealth Scan at 17:10, 2.50s elapsed (1000 total ports)
Initiating Service scan at 17:10
Scanning 5 services on www.wikipidia.com (103.102.166.226)
Completed Service scan at 17:10, 17.25s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against www.wikipidia.com (103.102.166.226)
Retrying OS detection (try #2) against www.wikipidia.com (103.102.166.226)
Initiating Traceroute at 17:10
Completed Traceroute at 17:10, 3.03s elapsed
Initiating Parallel DNS resolution of 4 hosts. at 17:10
Completed Parallel DNS resolution of 4 hosts. at 17:10, 5.78s
elapsed NSE: Script scanning 103.102.166.226.
Initiating NSE at 17:10
Completed NSE at 17:10, 15.28s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 1.77s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 0.01s elapsed
Nmap scan report for www.wikipidia.com
(103.102.166.226) Host is up (0.077s latency).
rDNS record for 103.102.166.226: ncredir-lb.eqsin.wikimedia.org
Not shown: 989 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp filtered ssh
25/tcp filtered smtp
80/tcp open http nginx 1.22.1
|_http-server-header: nginx/1.22.1
|_http-title: Web Filter Violation
179/tcp filtered bgp
443/tcp open ssl/http nginx 1.22.1
| ssl-cert: Subject: commonName=wikipedia.com
| Subject Alternative Name: DNS:*.en-wp.com, DNS:*.en-wp.org,
DNS:*.mediawiki.com,
DNS:*.voyagewiki.com, DNS:*.voyagewiki.org, DNS:*.wiikipedia.com,
DNS:*.wikibook.com, DNS:*.wikibooks.com, DNS:*.wikiepdia.com,
DNS:*.wikiepdia.org, DNS:*.wikiipedia.org, DNS:*.wikijunior.com,
DNS:*.wikijunior.net, DNS:*.wikijunior.org, DNS:*.wikipedia.com, DNS:en-wp.com,
DNS:en-wp.org, DNS:mediawiki.com, DNS:voyagewiki.com, DNS:voyagewiki.org,
DNS:wiikipedia.com, DNS:wikibook.com, DNS:wikibooks.com,
DNS:wikiepdia.com,
DNS:wikiepdia.org, DNS:wikiipedia.org, DNS:wikijunior.com, DNS:wikijunior.net,
DNS:wikijunior.org, DNS:wikipedia.com
| Issuer: commonName=E5/organizationName=Let's Encrypt/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: ecdsa-with-SHA384
| Not valid before: 2024-09-01T23:21:49
| Not valid after: 2024-11-30T23:21:48
| MD5: a97a:d532:433e:5aaa:863a:b7a4:d6ca:4eb1
|_SHA-1: e943:22a6:6b31:3e58:5bf9:ab97:3b46:a88b:a3b8:599b
|_http-server-header: nginx/1.22.1
|_ssl-date: TLS randomness does not represent time
|_http-title: Did not follow redirect to
https://www.wikimedia.org | http-methods:
|_ Supported Methods: GET HEAD
2000/tcp open tcpwrapped
5060/tcp open tcpwrapped
5666/tcp filtered nrpe
8010/tcp open ssl/http-proxy FortiGuard Web Filtering
|_ssl-date: 2024-09-23T11:40:53+00:00; 0s from scanner time.
| ssl-cert: Subject: commonName=www.wikipidia.com
| Subject Alternative Name: DNS:www.wikipidia.com
| Issuer:
commonName=FG4H0FT923904402/organizationName=Fortinet/stateOrProvinceNa
me =California/countryName=US
| Public Key type: ec
| Public Key bits: 256
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2024-03-21T09:26:43
| Not valid after: 2026-06-24T09:26:43
| MD5: 82aa:2d10:d7cb:e6bb:cd40:0295:8ba4:5181
|_SHA-1: 6a91:de09:d965:03cf:9b27:db98:e32a:f482:275d:0d19
|_http-title: Web Filter Block
Override | http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS |_sstp-
discover: SSTP is supported.
9090/tcp filtered zeus-admin
9100/tcp filtered jetdirect
Aggressive OS guesses: Linux 4.19 (90%), Linux 3.2 - 3.8 (88%), Linux 4.15 (87%),
Linux
4.19 - 5.15 (87%), Android TV OS 11 (Linux 4.19) (86%), IPFire 2.25 firewall (Linux
4.14) (86%), IPFire 2.27 (Linux 5.15 - 6.1) (86%), Linux 2.6.32 (86%), Linux 2.6.32
or
3.10 (86%), Linux 3.4 (86%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 38.033 days (since Fri Aug 16 16:23:39 2024)
Network Distance: 10 hops
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: All zeros
TRACEROUTE (using port 3306/tcp)
HOP RTT ADDRESS
1 0.00 ms 192.168.0.11
2 ... 3
4 44.00 ms 172.31.180.57
5 ... 7
8 76.00 ms if-ae-24-2.thar1.40b-singapore.as6453.net (180.87.164.16)
9 69.00 ms 180.87.164.62
10 77.00 ms ncredir-lb.eqsin.wikimedia.org (103.102.166.226)
NSE: Script Post-scanning.
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Initiating NSE at 17:10
Completed NSE at 17:10, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at
https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 54.37 seconds
Raw packets sent: 1101 (52.032KB) | Rcvd: 1056 (43.640KB)
• Port / Host
• Topology
• Host Details
Conclusion
Nmap is a powerful tool for network discovery and security assessment,
providing essential insights into the availability of services and potential
vulnerabilities in systems. By utilizing different scan types, such as SYN
scans, users can conduct stealthy and efficient assessments of networked
devices.
In the context of a well-known website like www.wikipedia.com, using a
SYN scan can help identify open ports and running services while
minimizing the risk of detection. However, it is crucial to emphasize the
importance of ethical considerations and legal compliance when using Nmap.
Unauthorized scanning can lead to serious legal consequences. Always
ensure you have explicit permission before performing any scans on external
networks or systems.