Scan security weakness on Firewall by Nmap

How to Scan security weakness on Firewall by Nmap

Example: Your FW is 192.168.1.1

1. Nmap null scan

[root@localhost ~]# nmap -sN 192.168.1.1
Starting Nmap 5.51 ( http://nmap.org ) at 2012-12-10 01:34 PST
Nmap scan report for 192.168.1.1
Host is up (0.0037s latency).
All 1000 scanned ports on 192.168.1.1 are open|filteredNmap done: 1 IP address (1 host up) scanned in 21.87 seconds
[root@localhost ~]#

2. Nmap Fin Scan

[root@localhost ~]# nmap -sF 192.168.1.1
Starting Nmap 5.51 ( http://nmap.org ) at 2012-12-10 01:38 PST
Nmap scan report for 192.168.1.1
Host is up (0.014s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
21/tcp filtered ftp
23/tcp open|filtered telnet
80/tcp open|filtered httpNmap done: 1 IP address (1 host up) scanned in 3.27 seconds
[root@localhost ~]#

3. Nmap Xmas Scan

[root@localhost ~]# nmap -sX 192.168.1.1
Starting Nmap 5.51 ( http://nmap.org ) at 2012-12-10 01:39 PST
Nmap scan report for 192.168.1.1
Host is up (0.016s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
21/tcp filtered ftp
23/tcp open|filtered telnet
80/tcp open|filtered httpNmap done: 1 IP address (1 host up) scanned in 2.82 seconds
[root@localhost ~]#

That’s all. Thanks for using IThelpblog.com

Tags:  

Leave a reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>