Skip to content

Ombasa7/Network-Port-Scan-Task1

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Final Nmap Scan Summary (from screenshot):

IP Address MAC Address Open Ports Services
10.0.2.2 52:54:00:12:35:02 None
10.0.2.3 52:54:00:12:35:03 None
10.0.2.4 52:54:00:12:35:04 None
10.0.2.15 Your Kali system 80 HTTP

Files to Include

  1. scan_result.txt
  2. scan.pcapng — ✅ Saved via Wireshark.
  3. README.md

Final README.md Template

#  Network Port Scanning Task

# Objective
Scan the local network to discover open ports and understand potential exposure using Nmap and Wireshark.

# Tools Used
- Nmap (for scanning)
- Wireshark (for packet capturing)

# Steps Followed

1. Checked local IP: `10.0.2.15/24`
2. Identified network range: `10.0.2.0/24`
3. Ran Nmap TCP SYN scan:
   ```bash
   sudo nmap -sS 10.0.2.0/24 -oN scan_result.txt
  1. Captured packets with Wireshark and saved as scan.pcapng
  2. Analyzed scan results

Findings

IP Address MAC Address Open Ports Services
10.0.2.2 52:54:00:12:35:02 None
10.0.2.3 52:54:00:12:35:03 None
10.0.2.4 52:54:00:12:35:04 None
10.0.2.15 Local machine 80 HTTP

⚠️ Risks Identified

  • Port 80 (HTTP) is open on the host machine.
  • HTTP is unencrypted, which makes it vulnerable to eavesdropping and man-in-the-middle attacks.

Files Included

  • scan_result.txt: Nmap output
  • scan.pcapng: Wireshark capture
  • README.md: Task documentation

Outcome

Gained hands-on experience in network scanning and learned how to identify basic service exposure using open ports.

About

Port Scanning task using Nmap and Wireshark

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors