Preview

UNIT 3 ASSIGNMENT 1: CHOOSING PORT SCANNING SOFTWARE

Satisfactory Essays
Open Document
Open Document
281 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
UNIT 3 ASSIGNMENT 1: CHOOSING PORT SCANNING SOFTWARE
In this assignment, you will explain the purpose of port scanning and choose port scanning software to increase server security.
1. What is port scanning?
Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.
2. What is the goal of port scanning?
Purpose of port scanning is to discover as much information as you can on the target in order to find out if there's are known vulnerabilities or openings in the targets network.
3. Would you prefer an open source or proprietary port scanning software?
I definitely prefer Open Source. It’s easier to fix and debug open source rather than the proprietary software. In open source, bugs are usually submitted to an online issue tracking system, which is public to any user. For efficient and simple everyday support issues and errors there is not an extreme difference between open source support and proprietary software support.
4. What port scanning software would you recommend to your Senior Administrator? Explain why.
Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

You May Also Find These Documents Helpful

  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Pktstat displays a real-time list of active connections seen on a network interface, and how much bandwidth is being used by what. Partially decodes HTTP and FTP protocols to show what filename is being transferred. X11 application names are also shown.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping screening is a device used by people who want to get access to a computer either legally or illegally. Hackers that are trying to gain access to any computers within a company or home will use a Ping sweep to see if any computers are on. Network Administrators and also use a Ping sweep to see which computers are on as well, but for fixing or making adjustments as needed within their network. IP companies also send a Ping sweep which helps them determine if there is a problem between their hub and our internet connection.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Virus Essay

    • 437 Words
    • 2 Pages

    Identifying suspicious behavior from any computer program which might show infection. Such analysis may include data captures, port monitoring and other methods.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Common Ports

    • 318 Words
    • 11 Pages

    COMMON PORTS packetlife.net TCP/UDP Port Numbers 7 Echo 554 RTSP 19 Chargen 2745 Bagle. H 6891-6901 Windows Live 546-547 DHCPv6 2967 Symantec AV 6970 Quicktime 560 rmonitor 3050 Interbase DB 7212 GhostSurf 22 SSH/SCP 563 NNTP over SSL 3074 XBOX Live 23 Telnet 587 SMTP…

    • 318 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    1. A customer calls into the call center to ask a question about setting up a server. The customer wants to know which ports to use to configure the server, where the ports are located, and how to access them. Select the problem statement that characterizes the customer's problem.…

    • 10888 Words
    • 32 Pages
    Powerful Essays
  • Powerful Essays

    Ports often have cargo-handling equipment, such as cranes and forklifts for use in loading ships, which may be provided by private interests or public bodies. Often, canneries or other processing facilities will be located nearby. Some ports feature canals, which allow ships further movement inland. Access to intermodal transportation, such as trains and trucks, are critical to a port, so that passengers and cargo can also move further inland beyond the port area.…

    • 1218 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Android Wifi Apps

    • 833 Words
    • 4 Pages

    Nmap is a network scanner tool which gives the entire information of the ip address and website. There is a version of nmap for Android users too, with the help of this app hackers can scan the ip's through mobiles.…

    • 833 Words
    • 4 Pages
    Good Essays