Skip to content

A practical network reconnaissance project using Nmap to discover live hosts, identify open ports, and analyze device fingerprints on a home LAN. Demonstrates host discovery techniques, scan optimization for stealth, and proper documentation of security assessments in controlled environments.

License

Notifications You must be signed in to change notification settings

BenjaminChukwu05/Network_Discovery_Using_Nmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛠️ PROJECT TITLE: Internal Network Discovery Using Nmap

🎯 OBJECTIVES

Use Nmap to discover live hosts on my network and identify their open ports for basic enumeration.

🧰 TOOLS USED

  • Nmap: For scanning and discovering hosts
  • VMware: Testing environment
  • Kali Linux: Scanning OS

🌐 NETWORK SETUP

  • Mode: Bridged

Reason: NAT mode prevented the VM from accessing other devices on my home Wi-Fi. Bridged mode allowed the VM to act like a separate device on the same network.

  • VM IP: 192.168.0.192

  • Host IP: 192.168.0.156

  • Target Devices:

    • iPhone: 192.168.0.169
    • Mystery Device: 192.168.0.150

🪜 STEP-BY-STEP PROCESS

  1. Identify VM IP Address

    ip a

    Used this instead of ifconfig to avoid unnecessary noise.

  2. Confirm Network Range

    ip route

    Output:

    default via 192.168.0.1 dev eth0 proto dhcp src 192.168.0.192 metric 100
    192.168.0.0/24 dev eth0 proto kernel scope link src 192.168.0.192 metric 100
    
  3. Scan for Live Hosts in the Subnet

    nmap -sn 192.168.0.0/24

    Initially used 192.168.0.1/24 which missed a device. Updating to 192.168.0.0/24 caught all active devices.

❗ CHALLENGES FACED

🧩 Challenge 1: Device Not Showing in Scan

My iPhone wasn't detected in the initial scan.

  • ✅ Checked Wi-Fi and connection status

  • ✅ Confirmed the IP manually

  • ✅ Scanned directly with:

    nmap 192.168.0.169
  • ✅ Realized I was using the wrong subnet start (192.168.0.1 instead of 192.168.0.0)

🧱 Challenge 2: Ports Were “Ignored” or “Filtered”

  • Used individual scans and nmap -p- to check port response
  • 🧪 Later planned to check firewall rules or test with --reason flag

🧠 WHY I DID IT THIS WAY

Decision Reason
Used -sn ping scan To detect live hosts without scanning ports. Faster and stealthier
Didn’t use -sV or -A Too noisy and unnecessary at this phase
Scanned /24 range Most home networks use this subnet size; covers 254 hosts

📊 RESULTS

  • Scan Command: nmap -sn 192.168.0.0/24
  • Scan Date: 2025-05-30
  • Total Devices Found: 3 (excluding host + VM)
IP Address MAC Vendor / Hostname Notes
192.168.0.1 Guangzhou Tozed Kangwei MTN Router, Ports: 53, 80, 443, 5555
192.168.0.169 Apple Inc. (iPhone) My Personal iPhone
192.168.0.150 Intel Corp. (No Hostname) Mystery Device (Brother’s PC)

📚 WHAT I LEARNED

  • Difference between -sn, -sS, and -sV
  • How to accurately identify devices on a subnet
  • Importance of choosing the right subnet range
  • First-hand experience documenting real-world problems

🔍 OBSERVATIONS

📡 Router - 192.168.0.1

  • Port 80 & 443 → Likely used for Web Admin Interface
  • Port 53 → Internal DNS Resolution
  • Port 5555/7777 → Possibly remote management (could be worth investigating)

📱 iPhone - 192.168.0.169

  • No open ports (expected)
  • Identified via MAC

🖥️ Mystery Device - 192.168.0.150

  • No hostname
  • Detected MAC suggests it's a PC

💬 REFLECTIVE SUMMARY

How did it feel? Felt good overall—I've used Nmap before, but this time I did it with a purpose and a plan.

What frustrated me? Not seeing all devices in the scan threw me off at first. Turns out it was a subnet start issue.

What am I proud of? That I finally completed and documented this properly. Not just screenshots—actual thinking and reflection.

About

A practical network reconnaissance project using Nmap to discover live hosts, identify open ports, and analyze device fingerprints on a home LAN. Demonstrates host discovery techniques, scan optimization for stealth, and proper documentation of security assessments in controlled environments.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published