Preview

LAB 1 NMAP Exercise Answers

Powerful Essays
Open Document
Open Document
3198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAB 1 NMAP Exercise Answers
Nmap LAB EXERCISE
CSEC 640 LAB-1
University of Maryland University College
B-McDerm
February 16, 2014

ASSIGNMENT PART A-NMAP
3.3 Lab Questions: Part A
1. What are the services that are running on each host?
Some of the hosts include the following services below, but not all “3” include the same services.
Domain: Host “3” only
FTP: All Host’s
HTTP: All Host’s
Microsoft-DS: All Host’s
Microsoft-RDP: All Host’s
MSRPC: All Host’s
MYSQL: All Host’s
Netbios-SSN: All Host’s
SSH: Host “3” only
Talent: All Host’s
The three diagrams below show the results from the OS Fingerprinting scan.
Figure 1: Host 1 (192.168.100.103)

Figure 2: Host 2 (192.168.100.105)

Figure 3: Host 3 (192.168.100.106)

2. Is Nmap able to identify the operating system running on each system? Is there any Nmap feature that can be used to guess the OS of a host? Explain your answer. Using the ports that are open and the probable services running on those ports, determine what operating systems are running on the devices. Explain your answer.
Nmap was not able to classify the operating system (OS) running on all “3” hosts provided during the exercise. However, Nmap was able to identify and determine the OS running on “Host 1” as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess).
The initial scan determined that “Host 1” was

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    6. Can ZenMap GUI detect what operating systems are present on IP servers and workstations? What would that option look like in the command line if running a scan on 172.30.0.10?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Geoff has a written agreement with Huck. To accomplish the objectives of this relationship, Geoff's authority can…

    • 1177 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    11. If a computer is found to have an IP address of 169.254.1.1, what can you assume…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    6. The Windows 7 command line utility that can tell if the TCP/IP stack of another system on the network is functioning normally is called Ping.exe…

    • 440 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Module One Lab Questions

    • 512 Words
    • 2 Pages

    Your first lab link can be found at what makes a Good Parent? A written transcript is also available for this lab.…

    • 512 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare in the following matrix. Insert the three chosen versions and fill out the columns based on the components on the left-hand side of the matrix.…

    • 1522 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    netstat: Work in conjunction with the ifconfig command to provide a status condition of the TCP/IP network interface.…

    • 1015 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    1. Name five current operating systems (not mentioned in this chapter) and the computers or configurations each operate.…

    • 889 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Temptation is a huge theme in the book, let alone in this book. Odysseus must restrain himself on numerous occasions. For example when he comes across Melanthius, who kicks him, he must control himself and not fight back, just yet. Also, when Odysseus recognizes his dog, he cannot show affection, for it would blow his cover as a beggar. Another example of temptation would be when Odysseus sees food being passed out, however doesn’t receive very much at all. Of course he is tempted to take it, for it is his food rightfully, however he doesn’t. Lastly, when Penelope wishes to speak with Odysseus, he postpones it for later, even though he would love to speak with his wife who he hasn’t seen in over 20 years. The one that…

    • 1167 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Network Sniffing

    • 435 Words
    • 2 Pages

    Process of monitoring a network to gather information that may be useful Use by both “good guys” and “bad guys”…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To view only tcp or udp or unix connections use the t, u or x option.…

    • 732 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    When considering Linux over Windows operating system, Riordan manufacturing must examine and compare the network infrastructure of the two systems. When looking at the overall picture of both systems, both systems consist of some of the same features in networking. The author of Windows to Linux Road map states the following. “Linux and Windows both support a number of networking protocols, such as TCP/IP, NetBIOS, and IPX. Both support a wide variety of network adapters. Both provide the ability to share resources, such as files and printing, through the network. Both provide capability to perform network services, such as DHCP and DNS (Walden, 2003).” The three areas of interest that has been the primary focus for Riordan are the Protocol Stack, Network management, and Compatibility. These are important points to consider when making the decision to switch over from Windows to Linux.…

    • 606 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Ftp Server

    • 4247 Words
    • 17 Pages

    * if host2 is the same as the host you run it on (for security reasons,…

    • 4247 Words
    • 17 Pages
    Better Essays
  • Satisfactory Essays

    This research program performs network hosts discovery, network hosts identification, blocking/cutting of host network connection and unblocking of blocked hosts.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays