Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Task-9: Port Scanning #218

Closed
RickyTheDude opened this issue Dec 24, 2024 · 0 comments
Closed

Task-9: Port Scanning #218

RickyTheDude opened this issue Dec 24, 2024 · 0 comments
Labels
good first issue Good for newcomers open-for-all Any one can work on it without getting assigned, every PR can merge Points: 10

Comments

@RickyTheDude
Copy link
Collaborator

Task: Perform a Basic Port Scan on 127.0.0.1 Using Nmap 📌 Objective:

Perform a basic port scan on your localhost (127.0.0.1) using Nmap to identify open ports and the associated services.

💡 Steps to Follow:

  1. Install Nmap:

    • For Linux (Ubuntu/Debian-based systems):
      sudo apt update
      sudo apt install nmap
    • For macOS (using Homebrew):
      brew install nmap
    • For Windows:
      Download and install Nmap from the official Nmap website.
  2. Run the Nmap Scan:

    • Open a terminal and run the following command to scan ports on localhost (127.0.0.1):
      nmap 127.0.0.1
    • This will scan the default ports and display the open ports and services.
  3. Analyze the Output:

    • Review the output to identify open ports and the corresponding services. A typical output may look like:
      Starting Nmap 7.80 ( https://nmap.org ) at 2024-12-24 10:00 UTC
      Nmap scan report for 127.0.0.1
      Host is up (0.0000s latency).
      
      PORT   STATE SERVICE
      22/tcp open  ssh
      80/tcp open  http
      443/tcp open https
    • PORT: The port number
    • STATE: Whether the port is open or closed
    • SERVICE: The service running on the port
  4. Capture and Submit Your Output:

    • Take a screenshot of the Nmap scan results showing the open ports and services on 127.0.0.1.

🎯 Submission Format:

  • Submit the screenshot showing the results of your Nmap scan on 127.0.0.1. Ensure no sensitive information is visible.

🚨 Privacy Note:
Ensure that no personal IP addresses or sensitive information is visible in your screenshot.

Bonus Tip:
Explore other IPs in your network or virtual machines by modifying the IP in the command to discover more open ports!

Happy scanning! 🔍

@RickyTheDude RickyTheDude added Points: 10 good first issue Good for newcomers open-for-all Any one can work on it without getting assigned, every PR can merge labels Dec 24, 2024
@adith-nr adith-nr mentioned this issue Dec 25, 2024
This was referenced Dec 26, 2024
@23abdul23 23abdul23 mentioned this issue Dec 27, 2024
@shrut2606 shrut2606 mentioned this issue Dec 27, 2024
This was referenced Dec 28, 2024
@Darkknight0125 Darkknight0125 mentioned this issue Dec 30, 2024
@geethika-07 geethika-07 mentioned this issue Dec 31, 2024
@Snehalgupta-07 Snehalgupta-07 mentioned this issue Jan 3, 2025
@iking07 iking07 mentioned this issue Jan 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers open-for-all Any one can work on it without getting assigned, every PR can merge Points: 10
Projects
None yet
Development

No branches or pull requests

1 participant