Preview

School

Satisfactory Essays
Open Document
Open Document
629 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
School
Assessment Worksheet

15

1
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap)

LAb #1 – ASSESSMENT WORKSHEET

Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Course Name and Number: Student Name:
Hunny Tucker

Instructor Name:
Perry Hood

Lab due date:
9/12/13

Overview
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.
Note:
These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program.

Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify

whether that application starts as a service on the system or must be run manually.

windows applicaTion loaded
1. 2. 3. 4. 5.

sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No

tftpd32 filezilla wireshark Nessus NetWitness Investigator

16

Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,

LAN Switch 2, and the IP default gateway router?
TagetWindows01 Server- Source IP = 172.30.0.8 TargetUbuntu01 Server – Source IP = 172.30.0.4 TargetUbuntu02 Server – Source IP = 172.30.0.9 The Default Gateway IP is = 172.30.0.1

3. Did the targeted IP hosts respond to the ICMP echo-request packet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    Configure static networking on a Linux PC (host11) so that it can communicate with the other server (host12) in your lab environment.…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw204Week4

    • 1310 Words
    • 6 Pages

    Section 1Subnetting IP Address, Configuring Static Routes and Static Host Table - 15 Points * Task 6: Step 1 * Related Explanation or Response * Task 6: Step 3 * Related Explanation or Response * Task 6: Step 5 * Related Explanation or Response * Task 6: Step 6 * Related Explanation or Response * Summary Paragraph…

    • 1310 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Ceh Cheat Sheet

    • 3910 Words
    • 16 Pages

    Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records…

    • 3910 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…

    • 1258 Words
    • 6 Pages
    Good Essays
  • Good Essays

    school

    • 302 Words
    • 2 Pages

    he v-shaped pattern often occurs in the area where a fire originated, so it is possible that the space heater was the fire of origin (tests needs to be run to confirm). The crazed glass (by lab results) indicated that crazing is the result of rapid cooling of hot glass by the application of water. The protected surface shows there was an object on the floor protecting the area, What physical evidence did you find at the victim’s home?…

    • 302 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    school

    • 269 Words
    • 2 Pages

    In this essay I will compare the differences and similarities of events in the book “Hatchet” and the movie “A Cry in the Wild”. I realized that the book and movie had many differences and also some similarities. In my essay I will compare some events that happened to the main character Brian. I’m going to compare the differences on how the rescue plane came to save Brian, the animals that attacked him and the food he ate while he was stranded in Canada.…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    school

    • 3450 Words
    • 14 Pages

    The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.…

    • 3450 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Assessment of Blue Nile

    • 2906 Words
    • 12 Pages

    | |Build Your Own Feature - more and more online jewelry retailers have a feature for shoppers |…

    • 2906 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Nmap

    • 703 Words
    • 3 Pages

    Theory:- Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.…

    • 703 Words
    • 3 Pages
    Better Essays
  • Best Essays

    SCHOOL

    • 3318 Words
    • 14 Pages

    distinctive, both in terms of its historical development, and of its likely future shape. This…

    • 3318 Words
    • 14 Pages
    Best Essays
  • Good Essays

    School

    • 301 Words
    • 2 Pages

    In 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an objeIn 1687, aIn 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as tIn 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. he law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. ct that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    School

    • 3570 Words
    • 15 Pages

    Introduction: Cells can be very difficult entities to study. They are usually very small and transparent, yet extremely complex. Fortunately, there are many tools available to the cell biologist that aid in their study. The light microscope is to this day perhaps the single most important instrument used in Cell Biology. It is used under bright field conditions to study the organization of cells in fixed and stained sections of tissues. With phase contrast optics it is possible to monitor the movements of living cells and to observe changes in their subcellular organization. The light microscope may also be used to monitor certain operations such as cell fractionation and biochemical characterization of cellular components. See the following pages in ECB3 for more useful information: Microscopy: p. 6 -11 Characteristics of cell types: much of Chapter 1, see especially Panel 1-2 Cell Cultures: p. 157 and 161…

    • 3570 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Dns Client Diagnostic

    • 1553 Words
    • 7 Pages

    | Query [www.microsoft.com] against DNS Server 192.168.1.1, (Type = 0x1, Options = 0x10e8) returns 0x232d…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    school

    • 955 Words
    • 4 Pages

    Question 2 : The school considering a new system that will speed up the registration process. As a system analyst you are asked to develop a plan for fact-finding.…

    • 955 Words
    • 4 Pages
    Good Essays
  • Good Essays

    School

    • 6658 Words
    • 27 Pages

    A Hiligaynon chant traditionally sung during Lent in the province of Antique is heard next. This is performed…

    • 6658 Words
    • 27 Pages
    Good Essays