https://github.com/compcode1/nmap-encrypted-scanning
This project will analyze how encryption affects Nmap scans under different conditions.
https://github.com/compcode1/nmap-encrypted-scanning
encryption-decryption nmap ssh-client ssh-server tls
Last synced: 10 months ago
JSON representation
This project will analyze how encryption affects Nmap scans under different conditions.
- Host: GitHub
- URL: https://github.com/compcode1/nmap-encrypted-scanning
- Owner: Compcode1
- License: gpl-3.0
- Created: 2025-03-11T19:42:42.000Z (10 months ago)
- Default Branch: master
- Last Pushed: 2025-03-13T20:54:26.000Z (10 months ago)
- Last Synced: 2025-03-13T21:37:21.662Z (10 months ago)
- Topics: encryption-decryption, nmap, ssh-client, ssh-server, tls
- Language: Jupyter Notebook
- Homepage:
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
This project explored how Nmap detects and interacts with encrypted and unencrypted services across different network configurations.
We tested three scenarios to observe how Nmap responds to varying levels of encryption:
Unencrypted HTTP (Baseline)
Direct HTTPS using TLS
HTTP over SSH Tunnel
The goal was to analyze encryption visibility in Nmap scans and understand how encryption impacts fingerprinting and reconnaissance techniques.The ability to distinguish between encrypted and unencrypted services in NMAP scans is critical in cybersecurity, as it helps identify potential vulnerabilities in how data is transmitted over networks. By observing how encryption methods like TLS and SSH affect NMAP’s fingerprinting capabilities, we can better understand how attackers might exploit misconfigurations or weak encryption practices. This project directly correlates to real-world security assessments, where understanding the visibility and resilience of encryption in scans can aid in vulnerability detection, network hardening, and recognizing attack patterns such as man-in-the-middle attacks or data leakage over insecure channels.