top-rated free essay

Lab#1

By collinmck Oct 09, 2013 335 Words
Lab #1 Submission

1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually.

Wireshark – manual
Nessus Client – manual
Nessus Server Manager – can be set up to run at Startup
Filezilla Server Interface – starts as a service
Zenmap GUI - manual

2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router?

TargetWindows01 server – 172.30.0.8
TargetUbuntu01 server – 172.30.0.4
IP default gateway router – 172.30.0.1

3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?

Yes, 4 packets were sent, and all four returned.

4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary?

The TTL (Time to Live) fields vary.

5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?

NMAP-T4-A-V-PE-PS22, 25, 80,-PA21, 23, 80, 3389, 172.30.0.0/24

6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.

Ping Scan – scans if pings work
Quick Scan – quick network scan
Intense Scan – run a deep network scan
Regular Scan – normal (moderate) scan
Quick Traceroute – quickly scans router hops

7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. There were 36 scans

8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report.

ARP Scan
SYN Stealth Scan
RPC Grind Scan
OS Detection

9. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) find on the network?

6 IP hosts were found.

10. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you perform on the VSCL target machines?

Port Scan and Vulnerability assessment

Cite This Document

Related Documents

  • MKT 571 Quizzes week 1 6

    ...Quiz Week 1   1 One of the most critical steps in the defining process of market research is  defining the problem, the decision alternatives, and research objectives  2 ​ Wabash Bank would like to understand if there is a relationship between the advertising or promotion it  does and the number...

    Read More
  • benetton images 1

    ...15 Exhibit: II Benetton’s famous advertisements Picture 1 Globe Campaign (1986) Picture 3 A black hand and a white hand linked by handcuff Picture 2 Israeli and Arab (1987) Picture 4 Black and White Hand (1990) (1989) Picture 5 An angelic-looking white child embracing a black one whose hair shaped into devil's horns created a lot of cons...

    Read More
  • APUSH Chapter 1 Cornell Notes

    ...  Mikaela Duguil  Period: 6          Chapter 1 Cornell notes  1. What was not an important goal of the early English explorers and colonists? It was  not an important goal to build a new nation.  2. Discuss the factors that transformed the colonist and caused them to envision and  creating an i...

    Read More
  • Computer Lab Rules & Regulations

    ...Computer Lab Rules & Regulations Electronic workstations may only be used by current Swinburne University students and staffs. Swinburne identity card must be presented on request. Swinburne computing facilities should only be used for educational, research and administrative purposes of Swinburne. All other uses are strictly prohibited. The...

    Read More
  • Computer Lab Managemetn System

    ...CHAPTER 1 TITLE AND ITS BACKGROUND Introduction Management system is a proven framework for managing and continually improving the organization's policies, procedures and processes.This may encompass information sharing, benchmarking, team working and working to the highest quality and environmental principles. It helps the organization t...

    Read More
  • Online Computer Labs Monitoring System

    ...CHAPTER 1. TOPIC: DESIGN AND IMPLEMENTATION OF AN ONLINE COMPUTER LABS MONITORING SYSTEM CASE STUDY: NATIONAL UNIVERSITY OF RWANDA ICT CENTER/Helpdesk Unit ...

    Read More
  • Campus Computer Labs: The Issue at Hand

    ...Campus Computer Labs: The Issue At Hand As a student at Prince Georges Community College I like to take full advantage of all the resources available to me since at the end of the day I am paying for them. This sometimes includes staying a few hours on campus and doing my work instead of waiting until I get home to do it. One major problem th...

    Read More
  • REFLECTION ON Ep.1 FS

    ...Jezza Rose M. Glorioso BEED – II Reflection Episode 1: Principle of Learning In this first episode for Field Study 2 entitled “Principle of Learning”, I observe that the teachers adhere to the stated principles of learning other teachers may have their own method or strategy to pull of f those principles but it only says that t...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.