SECURITY TESTING TOOL-SET FOR NEWBIE

  • nmap – Scan ports and identify the ports that have to be closed or filtered. I insist on having them “filtered” instead of “closed”. I used nmap on testinsane.com and here is the result. (Note that, you have to get the IP address of the website you intend to scan. And IP address can be retrieved from your terminal command “ping website-name”. And once you see the IP address, use “sudo nmap -sS website-ip-address”

santhoshs-air:~ santhoshshivanandtuppad$ sudo nmap -sS 143.95.75.172
Password:

Starting Nmap 7.40 ( https://nmap.org ) at 2017-03-21 16:46 GMT
Nmap scan report for ip-143-95-75-172.iplocal (143.95.75.172)
Host is up (0.12s latency).
Not shown: 983 filtered ports
PORT     STATE SERVICE
21/tcp   open  ftp
25/tcp   open  smtp
26/tcp   open  rsftp
53/tcp   open  domain
80/tcp   open  http
110/tcp  open  pop3
143/tcp  open  imap
443/tcp  open  https
465/tcp  open  smtps
554/tcp  open  rtsp
587/tcp  open  submission
990/tcp  open  ftps
993/tcp  open  imaps
995/tcp  open  pop3s
1433/tcp open  ms-sql-s
3306/tcp open  mysql
7070/tcp open  realserver

Nmap done: 1 IP address (1 host up) scanned in 8.32 seconds
santhoshs-air:~ santhoshshivanandtuppad$

 

Leave a Reply

Your email address will not be published. Required fields are marked *