Lab #1 - Assessment Worksheet
Performing Network Reconnaissance using Common Tools
2580
Course Name and Number: _____________________________________________________ kevin anderson
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you explored the common tools available in the virtual lab environment. You used
Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.
Lab Assessment Questions & Answers
1. Name at least five applications and tools used in the lab.
FileZilla, net witness investigator, Open VAS,PuTTY,Wireshark.
2. What is promiscuous mode? it allows Wireshark to capture packets to any host on the same supnet or VLAN
3. How does Wireshark differ from NetWitness Investigator?
NetWitness allows analysts and view the packets
4. Why is it important to select the student interface in the Wireshark? it runs in a lab setting
5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? yourname_IntenseScan 6. Name at least five different scans that may be performed with Zenmap.
Intense Scan, Basic Recon,fisheye,pingscan,
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION
2
7. How many different tests (i.e., scripts) did your Intense Scan perform?
255
8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report.
9. How many total IP hosts did Zenmap find on the network?
255
You May Also Find These Documents Helpful
-
The most critical part, the Cable and Fiber Preparation where the fiber is mounted, is the ferrule. The Ferrule is a long, thin cylinder with the fiber mounted in the center hole. The center hole is sized to match fiber's cladding diameter which is usually 125um. When fiber connector ferrules are made from several types of materials including ceramic(Zirconia), stainless steel and plastic. The ferrule's job is to center and align the fiber and protects it from mechanical damage. The end of fiber is at the end of the ferrule, where the fiber end is polished smooth either flat or with a curvature. The ferrule is mounted in the connector body and then the connector body is attached to the fiber optic cable structure. Finally, a strain-relief rubber boot protects the connector-cable junction.…
- 595 Words
- 2 Pages
Satisfactory Essays -
Read the paper “Post–Green Revolution Trends in Yield Potential of Temperate Maize in the North-Central United States” by Duvick and Cassman (In Blackboard – Seed Technology folder).…
- 370 Words
- 2 Pages
Good Essays -
1. It is important to know how many system words will fit in a primary storage device on a computer so you know how big of a storage unit you have. The more system words that will fit in a primary storage device, the more memory you have on your computer.…
- 319 Words
- 4 Pages
Satisfactory Essays -
I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…
- 2232 Words
- 17 Pages
Satisfactory Essays -
1. There are three patterns outlined on the screen. Which one of these is identifying the noise floor?…
- 257 Words
- 2 Pages
Satisfactory Essays -
Specifies a list of IP addresses for routers on the client's subnet. Multihomed computers can have only one list per computer, not one per network adapter.…
- 1103 Words
- 4 Pages
Better Essays -
12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…
- 1546 Words
- 8 Pages
Satisfactory Essays -
1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…
- 56 Words
- 1 Page
Satisfactory Essays -
With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…
- 581 Words
- 3 Pages
Good Essays -
Answer the following questions about the results of the virtual lab activity. Record your answers in the boxes.…
- 307 Words
- 3 Pages
Satisfactory Essays -
➢ To define a class of your own and use it to create an object.…
- 252 Words
- 2 Pages
Satisfactory Essays -
First, what is the definition of Window of Vulnerability (WoV)? According to www.techopedia.com, an IT dictionary and more for the IT word, the definition states that “vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. Vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.”¹ To calculate this time frame or window of vulnerability mean that we much think about a number of attributes to the situation. The specific attributes we must use in the calculation are the time it takes the attack to start and when the attack is found and removed or fixed. The time from the start to the removal or fix is the window of vulnerability.…
- 465 Words
- 2 Pages
Satisfactory Essays -
For this lab, we will only need to connect to vlab-PC1. The computer vlab-PC1 is the computer on the left side while vlab-PC2 is on the right. If you leave the cursor on the PC icon for a few seconds, a tool-tip message will appear indicating the hostname of the PC. Open vlab-PC1 and log in as Administrator with the password password.…
- 2069 Words
- 9 Pages
Satisfactory Essays -
EVIE is a JISC-funded project which is aiming to develop a virtual research environment for staff…
- 11349 Words
- 46 Pages
Powerful Essays -
Network monitoring tools can have many important functions that can increase the scaleability and usefulness of a network. They ensure that the computers and devices on the network are functioning at the highest level possible, and are available. They also can help increase the productivity and ease of an IT department's job, so it's important that they choose the right product that suits their needs the best.…
- 672 Words
- 3 Pages
Good Essays