"Zenmap" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 1 of 5 - About 44 Essays
  • Satisfactory Essays

    ZenMap

    • 298 Words
    • 2 Pages

    Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-21 22:23 Eastern Daylight Time Nmap scan report for ROUTER Host is up (0.0038s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp closed domain 1723/tcp closed pptp MAC Address: C8:D7:19:5D:CE:71 (Cisco Consumer Products) Nmap scan report for PHONE Host is up (0.24s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp closed domain 1723/tcp closed pptp MAC Address: 78:4B:87:C1:3F:B1 (Murata

    Premium Linux IP address Time zone

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab #1 – Assessment Worksheet Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts‚ open ports‚ and services enabled on servers and workstations. In this lab‚ you planned an attack

    Premium Management Education Marketing

    • 1091 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    School

    • 629 Words
    • 3 Pages

    Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Hunny Tucker Instructor Name: Perry Hood Lab due date: 9/12/13 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the

    Premium Router IP address Subnetwork

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally‚ you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically

    Premium Computer security Security Operating system

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab#1

    • 335 Words
    • 2 Pages

    identify whether that application starts as a service on the system or must be run manually. Wireshark – manual Nessus Client – manual Nessus Server Manager – can be set up to run at Startup Filezilla Server Interface – starts as a service Zenmap GUI - manual 2. What was the allocated source IP host address for the TargetWindows01 server‚ TargetUbuntu01 server‚ and the IP default gateway router? TargetWindows01 server – 172.30.0.8 TargetUbuntu01 server – 172.30.0.4 IP default gateway

    Free Linux Subnetwork Internet Protocol

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application. Zenmap is an application that is used to scan ports for networks. A scenario where it can be used is to scan the ports of a network to know exactly which ports are opened or closed thus allowing a network administrator to reduce the vulnerability of its network. 2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan

    Premium Computer security Security Operating system

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application. It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running. 2. What is the relationship between risks‚ threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? Threats and vulnerabilities lead risks‚ if you don’t have then then

    Premium Operating system Risk Security

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    Lab #1 Assessment Questions & Answers 1. Windows Applications Starts As Service Y/N Wireshark N FIleZilla Server Interface Y Nessus Client N Tftpd32_SE Admin N Nessus Server N Nmap Zenmap Gui M 2. What was the DHCP allocated source IP host address for the student VM‚ DHCP Server‚ and IP default gateway router? IP Address………….172.30.0.58 Subnet Mask………255.255.255.0 Default Gateway….172.30.0.1 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an

    Premium IP address Dynamic Host Configuration Protocol Subnetwork

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    connected to a remote Windows machine and explored two file transfer applications‚ FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally‚ you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. FileZilla‚ net witness investigator‚ Open VAS‚PuTTY‚Wireshark. 2. What is promiscuous

    Free Performance Performing arts Network topology

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    Workstation Instructor Name: ________________ Lab Assessment Questions 1. What are the five steps of a hacking attack? 2. During the reconnaissance step of the attack‚ describe what task Zenmap GUI performs to do passive OS fingerprinting. 3. 4. 2 3. What step in the hacking attack process uses Zenmap GUI? 4. What step in the hacking attack process identifies known vulnerabilities and exploits? 5. During the scanning step of the hacking attack process‚ you identified known software

    Premium Operating system Windows XP Computer security

    • 645 Words
    • 3 Pages
    Satisfactory Essays
Previous
Page 1 2 3 4 5