NMap Pi

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law. 

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

  • Understand how to best use Nmap;

  • Understand the principles of network and port scanning;

  • Understand how this intelligence is the foundation for “Ethical” Hacking.

 

Hardware Required

Component Number (Box Case)

Slot 1

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13 

Component

Raspberry Pi + Case 

USB Cable 

Kali SD Card 

TFT Screen 

HDMI Cable 

Keyboard 

Mouse 

Power Supply Unit 

 

Video Guide

 

conclusion

The Common Vulnerabilities and Exposures (CVE) database is a great place to find specific vulnerabilities for protocols that will aid in the next phases of “Ethical” hacking, and Nmap provides a great foundation for information that is required for the “Ethical” Hack. Without this information there is no target for attack, nearly all of the tools used for penetration testing need an IP address to target and without this, the process quickly becomes very difficult. Nmap has many flags that can be used, including those that allow an attacker to avoid firewalls and Intrusion Detection Systems (IDS. Building up experience by scanning other devices on your network and understanding how to interpret the data you collect is vitally important. It is possible to create a script that will access Nmap every day and send daily reports and alerts if anything was to change.