Validation of NMAP’s Network Behavior using Wireshark

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Polytechnic University of Puerto Rico

Abstract

NMAP is used to actively scan networks using different ping techniques. There is not much information available on how NMAP works besides its website. Although the program states how it works, there is little validation of its functionality. Wireshark, a network protocol analyzer, was used to validate these features in a test system environment: ping scans, OS detection, including port scanning and version detection. Among NMAP’s weaknesses, we find it relies on an OS Database that should be updated regularly to be able to detect new operating systems and that its scans produce a large number of packets, which might cause detection of the scan in a properly protected network environment. NMAP’s OS Database can also be used to simulate operating systems for network scans, such as in a honeypot, using a program called honeyd. Any scan in a foreign network environment should be corroborated with other tools, passively if possible. Key Terms - NMAP, Ping Scan, Remote OS Detection, Wireshark.

Description

Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico

Keywords

Citation

Cruz Ramírez, D. (2016). Validation of NMAP’s network behavior using wireshark [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.

Endorsement

Review

Supplemented By

Referenced By