Cybersecurity · Active Reconnaissance

Active Reconnaissance

Host discovery, port scanning, service/version detection, and script-based fingerprinting with Nmap.

View this project on GitHub

Table of Contents

Introduction

This document covers active reconnaissance using Nmap and companion tools inside a contained, virtualized lab with three VMs. We perform host discovery (arp-scan, fping, and Nmap ping scan), then move into TCP/UDP scanning and service fingerprinting. Finally, we use NSE scripts to enumerate common services on a Metasploitable2 host.

Host Discovery

Run ARP, ping sweeps, and Nmap discovery to identify live hosts on the local network.

Port Scanning & Host Fingerprinting

Fingerprinting with Nmap Scripts

Leverage Nmap Scripting Engine to enumerate service details and potential misconfigurations.

FTP Enumeration

SSH Enumeration

SMB Enumeration

Web Server Enumeration

Back to Home