Day 1: Nmap Fundamentals and Network Discovery 🗺️ (7 Hours)
Module 1: Introduction to Network Scanning (1.5 Hours)
- What is Nmap? (History, capabilities, and the role of Nmap in security and administration).
- Installation and Environment (Installing Nmap on Linux/Windows/macOS and basic command-line usage).
- Scanning Ethics (Legal and ethical considerations: only scan networks you have explicit permission to test).
Module 2: Host Discovery and Basic Port Scanning (2 Hours)
- The Three Phases of Scanning (Discovery, Port Scan, Service/OS Detection).
- Host Discovery Techniques (Identifying live hosts:
-sP/-sn, ARP requests, ICMP echo requests (-PE), and TCP/UDP pings). - Basic Port Scan Types (Understanding TCP SYN Scan (
-sS) vs. TCP Connect Scan (-sT)). - Specifying Targets (Scanning single hosts, IP ranges, subnets (CIDR), and reading targets from a file (
-iL)).
Module 3: Port Specifications and Output Formats (2 Hours)
- Targeting Ports (Scanning specific ports (
-p), port ranges, and all ports (-p-)). - Scan Timing (Adjusting scan speed: Timing templates (
-T0through-T5) and their impact on network performance). - Output Formats (Saving results to files: Normal (
-oN), Grepable (-oG), and XML (-oX) formats). - Advanced Target Specification (Excluding hosts (
--exclude) and defining random hosts (-iR)).
Module 4: Firewall Evasion and Stealth (1.5 Hours)
- Evasion Techniques (Using fragmentation (
-f), specifying source ports (--source-port), and sending custom headers). - Decoy Scans (Using decoy hosts (
-D) to obfuscate the origin of the scan). - IP Protocol Scan (
-sO): Detecting which IP protocols (TCP, UDP, ICMP, etc.) are supported by target hosts.
Day 2: Advanced Detection, NSE Scripting, and Vulnerability (7 Hours)
Module 5: Service and Version Detection (2 Hours)
- Service Probing (Executing the Service Version Detection scan (
-sV)). - RPC Scan (Detecting available RPC services (
-sR)). - Version Intensity (Controlling the depth of probes (
--version-intensity)). - Operating System Detection (Executing the OS Detection scan (
-O) and understanding its reliance on fingerprinting). - Aggressive Scan (Combining common detection options:
-A(OS, Version, Script, Traceroute)).
Module 6: Nmap Scripting Engine (NSE) Fundamentals (2.5 Hours)
- What is NSE? (Understanding the purpose and power of NSE for automation and advanced discovery).
- Script Categories (Reviewing common categories:
safe,vuln,auth,brute,discovery). - Running Scripts (Executing single scripts (
--script <name>) and categories (--script <category>), and script arguments). - Key Security Scripts (Practical labs using popular scripts):
- Vulnerability Scanning (
vulncategory scripts, e.g.,smb-vuln-*). - Authentication (
authcategory scripts, e.g.,ftp-anon). - Discovery (e.g.,
dns-brute,smb-enum).
- Vulnerability Scanning (
Module 7: Troubleshooting and Advanced Techniques (1.5 Hours)
- Debugging Scans (Using verbose output (
-v) and debugging options (-d) to understand slow or failed scans). - Traceroute (
--traceroute): Mapping the network path to the target. - Network Performance Tuning (Adjusting parallelization and timeouts for large-scale scanning).
- Firewall Evasion Review (Recap of stealth techniques and what modern firewalls look for).
Module 8: Review and Practical Lab (1 Hour)
- Scenario-Based Scanning (Applying the learned techniques to a simulated, layered network environment).
- Analyzing XML Output (Reviewing advanced analysis tools that parse Nmap’s XML output).