Running the network mapper

Your first network scan using Exploit pack

We have chosen to use Nmap as our main network scanning tool, mainly because it is very well know in the scene and most important, it is a stable tool. Nmap ("Network Mapper") is an open source tool for network exploration and security auditing. it was designed to rapidly scan large networks, although it works fine against single hosts. Follow these steps to obtain a list of open ports from the target machine, this is a crucial step on any pentest and should be done correctly.

To run the scanner, from the tab selection on the left side of the screen choose the "Utilities" tab, click on the black arrow next to "Scanner" and as you see on the image below, select "Nmap-scanner". ( If you haven't configured the Nmap Path under preferences this is a good time to do it. ) Specify a target to be scanned using Nmap by typing the IP Address or Hostname. Click on the button "Execute Auxiliary" and you will hear a voice saying: "New auxiliary deployed" and a bar on the bottom right part of your screen. Now you can wait until the scan is completed, this might take several minutes depending on your connection and the target response. Another factor to consider would be the options chosen for this scan, for example, a full scan of 1-65k ports will take longer than a simple scan to the top 1024 ports of target.

Once the scan is finished a screen will pop up and your selected target will now appear in the "Connection list" and under "Network scanner" the open ports will be listed.

Also, your new target and all its information will appear in the "Targets" tab. Feel free to modify this file and make use of the available options. You can use this feature as a notepad for your pentest so you can have different notes for each target. Handy, right?

The Network mapper

You can also run the network mapper wizard instead of directly running the module itself as shown below: