Final Nmap Scan Summary (from screenshot):
IP Address
MAC Address
Open Ports
Services
10.0.2.2
52:54:00:12:35:02
None
—
10.0.2.3
52:54:00:12:35:03
None
—
10.0.2.4
52:54:00:12:35:04
None
—
10.0.2.15
Your Kali system
80
HTTP
scan_result.txt
scan.pcapng — ✅ Saved via Wireshark.
README.md
# Network Port Scanning Task
# Objective
Scan the local network to discover open ports and understand potential exposure using Nmap and Wireshark.
# Tools Used
- Nmap (for scanning)
- Wireshark (for packet capturing)
# Steps Followed
1 . Checked local IP: ` 10.0.2.15/24 `
2 . Identified network range: ` 10.0.2.0/24 `
3 . Ran Nmap TCP SYN scan:
``` bash
sudo nmap -sS 10.0.2.0/24 -oN scan_result.txt
Captured packets with Wireshark and saved as scan.pcapng
Analyzed scan results
IP Address
MAC Address
Open Ports
Services
10.0.2.2
52:54:00:12:35:02
None
—
10.0.2.3
52:54:00:12:35:03
None
—
10.0.2.4
52:54:00:12:35:04
None
—
10.0.2.15
Local machine
80
HTTP
Port 80 (HTTP) is open on the host machine.
HTTP is unencrypted, which makes it vulnerable to eavesdropping and man-in-the-middle attacks.
scan_result.txt: Nmap output
scan.pcapng: Wireshark capture
README.md: Task documentation
Gained hands-on experience in network scanning and learned how to identify basic service exposure using open ports.