0% found this document useful (0 votes)
4 views8 pages

21MIS7154 Exp-1

The document outlines an experiment conducted by Rajavari Yeshwanth to install and use the Nmap tool for port scanning. It includes details about the software, IP addresses tested, and the Nmap output showing open and filtered ports. The conclusion confirms the successful execution of port scanning using Nmap tools.

Uploaded by

Yeshwanth Yesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views8 pages

21MIS7154 Exp-1

The document outlines an experiment conducted by Rajavari Yeshwanth to install and use the Nmap tool for port scanning. It includes details about the software, IP addresses tested, and the Nmap output showing open and filtered ports. The conclusion confirms the successful execution of port scanning using Nmap tools.

Uploaded by

Yeshwanth Yesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

CYBER SECURITY AND DIGITAL FORENSICS

EXPERIMENT NO:1

NAME: Rajavari Yeshwanth REG NO:21MIS7154

Aim:Install Nmap tools and perform an experiment to demonstrate use of nmap tool for port
scanning.

Software Required: Nmap Software Tool

Theory: Nmap, short for Network Mapper, is a free security scanner that is commonly used to
build pieces of software used within IT support roles. By searching for host machines and
services, the software is able to construct a map of the network and the entities within it. This
brings a range of benefits, including the ability to offer remote support to machines in different
locations.

IP ADDRESS: 127.0.0.1

NMAP OUTPUT
PORTS/HOSTS

TOPOLOGY

HOST DETAILS
IP ADDRESS 2: 172.19.36.97

NMAP OUTPUT

PORTS/HOSTS
TOPOLOGY

HOST DETAILS
IP ADDRESS 3: 172.18.10.10

NMAP OUTPUT

PORTS/HOST
TOPOLOGY

HOST DETAILS
Comparison Table for Your Work
S.N IP Address Nmap Output Ports (Open / Topology Host o Summary Filtered /
Details
Closed)

1 127.0.0.1 Host is up; Nmap Open Ports: 135, Host connected to Up, open
completed scan 139, 445, 3306, multiple = 5, with low latency. 9999
Closed: intermediate closed =
~993 TCP Ports nodes 993

2 172.19.36.9 Host is up; output Filtered Ports: Host on single Up,


7 showed filtered 25, 110, 548 network with filtered =
ports. Closed: ~992 fewer than 3 open 3, closed
TCP Ports ports = 992

3 172.18.10.1 Host is up; output Open Ports: 135, Host on single Up, open
0 similar to localhost 139, 445, 3306, network = 5,
with open and 9999 Filtered: 3 filtered = 3 filtered ports. ports

Conclusion: Hence We Perform Port Scanning using NMAP Tools

You might also like