Non-Standard NMAP Scans
The scanner nmap is a network scanning tool that allows for the scanning of network for host and service discovery. It is used by network administrators, hackers, and security processionals alike to see the underlying hosts and to see what information attached hosts present when sent to various network packets. This allows a potential threat actor to enumerate the hosts and services on that network and create what security professionals call the “Attack Surface” that is discovering the underlying technologies such as service versions, Operating Systems, usernames, etc., and then researching this data to discover an exploit that can be leveraged to gain unauthorized access to that network and leverage the associated network infrastructure for nefarious purposes.
Learning and using non-standard scanning techniques will help to assess a network topology, underlying technologies, and firewall rules and posture present in that network.
Overview
The student will perform non-standard NMAP scans on a network to:
- Determine open ports.
- Determine service versions.
- Map firewall rules and signature.
- Determine IDS and WAF (Web Application Firewall) coverage.