This repository contains the output for Task 1 of the Cybersecurity Internship at Elevate Labs.
Scan the local network to discover open ports and understand network exposure.
- Installed Nmap on Windows.
- Found my local IP range using
ipconfig– identified range as192.168.0.0/24. - Ran a TCP SYN scan:
nmap -sS 192.168.0.0/24
Saved results to scan_results.txt using: bash Copy code nmap -sS 192.168.0.0/24 -oN scan_results.txt
Output See the scan_results.txt file in this repository.
🔐 Observations Identified active devices on the network.
Noted the open ports and services on each.
Open ports such as 22 (SSH), 80 (HTTP), and 443 (HTTPS) can be entry points if not secured.
📚 Key Concepts Learned What open ports are and how they can expose a network
Basics of TCP SYN scanning
Importance of securing unused or unnecessary ports