information security

6
R.V.COLLEGE OF ENGINEERING, BANGALORE – 560059 DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING Title: NMAP port Monitoring 6th Semester Mini Project for 12IS4C6 4 INFORMATION SECURITY Synopsis submitted By Sl No USN Name Sign

Upload: prateekmandi

Post on 14-Nov-2015

214 views

Category:

Documents


2 download

DESCRIPTION

information security

TRANSCRIPT

R.V.COLLEGE OF ENGINEERING, BANGALORE 560059DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING

Title: NMAP port Monitoring

6th SemesterMini Project for

12IS4C64INFORMATION SECURITY

Synopsis submitted

BySl NoUSNNameSign

11RV12IS026Nishanth M S

21RV12IS034Prateek Mandi

Title: NMAP port Monitoring

Brief description:NMAP is a network mapping utility. This isa securityscanneroriginally written byGordon Lyon used to discoverhostsandserviceson acomputer network, thus creating a "map" of the network. It provides TCP/IP address, and it will identify any open "doors" or ports that might be available on that remote TCP/IP device. Some nmap scans can forge your identity to make it appear that a separate computer is scanning the network, or simulate multiple scanning decoys on the network. Nmap is available on flavors of UNIX, Linux, Windows, and Apple Macintosh OS X.Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes manyport scanning mechanisms (both TCP & UDP),OS detection,version detection, ping sweeps. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap-v-Atargethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Free: Nmap is an open source software.How to Download?1. Go to fromhttp://nmap.org/download.html.2. Select download option in the menu.3. Go to Source code distribution, select the OS.4. Then download the software from latest release.

Installing the Nmap in windows:1. Download the .zip binaries fromhttp://nmap.org/download.html.2. Uncompress the zip file into the directory you want Nmap to reside in. A directory callednmap-should be created, which includes the Nmap executable and data files.3. For improved performance, apply the Nmap Registry changes.4. Nmap requires the free WinPcap packet capture library.It can be obtained and installed fromhttp://www.winpcap.org. 5. Due to the way Nmap is compiled, it requires theMicrosoft Visual C++ 2010 Redistributable Packageof runtime components. Many systems already have this installed from other packages, else runvcredist_x86.exefrom the zip file.6. Instructions for executing your compiled Nmap are given inthe section called Executing Nmap on Windows.Executing Nmap on Windows:1. Make sure the user you are logged in as has administrative privilegeson the computer.2. Open a command/DOS Window, chooseStart->Runand typecmd.3. Change to the directory you installed Nmap into. Type the following commandsc:cd \Program Files (x86) \ Nmap 4. Executenmap.exe.Output format:Nmap provides four possible output formats:1. Interactive: presented and updated real time when a user runs Nmap from the command line. Various options can be entered during the scan to facilitate monitoring.2. XML: a format that can be further processed by XML tools. It can be converted into aHTMLreport usingXSLT.3. Grepable: output that is tailored to line-oriented processing tools such asgrep,sedorawk.4. Normal: the output as seen while running Nmap from the command line, but saved to a file.

Uses of NMAP: Auditing the security of a device or firewall by identifying the network connections which can be made to, or through it. Identifying open ports on a target host in preparation for auditing. Network inventory,network mapping, maintenance and asset management. Auditing the security of a network by identifying new servers. Generating traffic to hosts on a network. Find andexploitvulnerabilities in a network. Software Requirement: Operating System: Microsoft Windows XP. vcredist_x86.exe. WinPcap packet capture library.

Faculty Remarks

Faculty Signature1. 2.

H O D