Author: Deepika GL
Date: 2025-09-22
Scope: VM test networks 192.168.86.0/24
, 192.168.174.0/24
and local host 127.0.0.1
(only hosts owned by me)
-sn
to find live hosts.-sS
(when Npcap + Admin) or -sT
.-sV
) on interesting hosts.nmap -sn 192.168.86.0/24 -oN scans/discovery-vmnet8.txt
nmap -sS --top-ports 1000 -T4 -v -oN scans/top1000-vmnet8.txt 192.168.86.0/24
nmap -sV -p 22,80,443 192.168.86.10 -oN scans/svc-192.168.86.10.txt
nmap -sU --top-ports 200 -T3 -v -oN scans/udp-vmnet8.txt 192.168.86.0/24
| IP | Hostname | Ports (open) | Services | Risk Level | Recommendation | |—-|———-|————–|———-|————|—————-| |192.168.86.10|vm-web|22,80|ssh, http|Medium|Use key-based SSH; update web server; enable firewall| |192.168.86.15|vm-file|445|smb|High|Disable SMB if unused; restrict to admin VLAN; patch OS| |127.0.0.1||22,631|ssh, ipp|Low|Ensure SSH keys; disable unnecessary services|
(Populate this table from your actual scans/*.txt
outputs.)
See /scans
directory for full Nmap outputs (text and XML). See /pcaps
for packet captures.
This assessment was performed on VM-hosted test networks and local host only to avoid scanning production/corporate networks. Next steps: patch high-risk services and re-scan to confirm.
Author: Deepika GL
Date: 2025-09-22
Discover open ports on devices in my local network and assess exposure. Only hosts I own or have permission to scan were targeted.
10.40.6.102/21
→ network 10.40.0.0/21
(DO NOT scan without permission).192.168.174.0/24
(VMnet1), 192.168.86.0/24
(VMnet8).127.0.0.1
and 10.40.6.102
(only scan if you own the host).nmap -sn 192.168.86.0/24 -oN scans/discovery-vmnet8.txt
nmap -sS –top-ports 1000 -T4 -v -oN scans/top1000-vmnet8.txt 192.168.86.0/24 nmap -sT –top-ports 1000 -T4 -v -oN scans/top1000-vmnet8-connect.txt 192.168.86.0/24
nmap -sS -p- -T3 -v -oN scans/allports-192.168.86.10.txt 192.168.86.10
nmap -sV -p 22,80,443 192.168.86.10 -oN scans/svc-192.168.86.10.txt
nmap -sU –top-ports 200 -T3 -v -oN scans/udp-vmnet8.txt 192.168.86.0/24
nmap -sS –top-ports 1000 -oN scans/result.txt -oX scans/result.xml 192.168.86.0/24
scans/
— nmap outputs (txt, xml)pcaps/
— optional Wireshark capturesscreenshots/
— Wireshark / terminal screenshotsreport.md
— analysis + remediation