Preview

LAB 1 NMAP Exercise Answers

Powerful Essays
Open Document
Open Document
3198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
LAB 1 NMAP Exercise Answers
Nmap LAB EXERCISE
CSEC 640 LAB-1
University of Maryland University College
B-McDerm
February 16, 2014

ASSIGNMENT PART A-NMAP
3.3 Lab Questions: Part A
1. What are the services that are running on each host?
Some of the hosts include the following services below, but not all “3” include the same services.
Domain: Host “3” only
FTP: All Host’s
HTTP: All Host’s
Microsoft-DS: All Host’s
Microsoft-RDP: All Host’s
MSRPC: All Host’s
MYSQL: All Host’s
Netbios-SSN: All Host’s
SSH: Host “3” only
Talent: All Host’s
The three diagrams below show the results from the OS Fingerprinting scan.
Figure 1: Host 1 (192.168.100.103)

Figure 2: Host 2 (192.168.100.105)

Figure 3: Host 3 (192.168.100.106)

2. Is Nmap able to identify the operating system running on each system? Is there any Nmap feature that can be used to guess the OS of a host? Explain your answer. Using the ports that are open and the probable services running on those ports, determine what operating systems are running on the devices. Explain your answer.
Nmap was not able to classify the operating system (OS) running on all “3” hosts provided during the exercise. However, Nmap was able to identify and determine the OS running on “Host 1” as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess).
The initial scan determined that “Host 1” was

You May Also Find These Documents Helpful

  • Satisfactory Essays

    8) How many total IP hosts dod you find on the server farm VLAN using the Nessus Lab #4 server farm scan?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Part 1: Configure Access Rights to Folder & Files Using Microsoft GPO Manager & Enable Microsoft BSA to Define a Security Baseline Definition…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    11. If a computer is found to have an IP address of 169.254.1.1, what can you assume…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The 3 types of photographs taken at crime scenes are overview, intermediate and close-up photographs. Overview photographs show crime scene in wide angles taken at different angles to show entries and exits to the crime scene. Intermediate photographs are taken closer to the evidence, but still show area surrounding the evidence. Close-up photographs focus on an injury, a weapon, or any piece of…

    • 786 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare in the following matrix. Insert the three chosen versions and fill out the columns based on the components on the left-hand side of the matrix.…

    • 1522 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Module One Lab Questions

    • 512 Words
    • 2 Pages

    Your first lab link can be found at what makes a Good Parent? A written transcript is also available for this lab.…

    • 512 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Ftp Server

    • 4247 Words
    • 17 Pages

    * if host2 is the same as the host you run it on (for security reasons,…

    • 4247 Words
    • 17 Pages
    Better Essays
  • Satisfactory Essays

    To view only tcp or udp or unix connections use the t, u or x option.…

    • 732 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Sniffing

    • 435 Words
    • 2 Pages

    Process of monitoring a network to gather information that may be useful Use by both “good guys” and “bad guys”…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This research program performs network hosts discovery, network hosts identification, blocking/cutting of host network connection and unblocking of blocked hosts.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When considering Linux over Windows operating system, Riordan manufacturing must examine and compare the network infrastructure of the two systems. When looking at the overall picture of both systems, both systems consist of some of the same features in networking. The author of Windows to Linux Road map states the following. “Linux and Windows both support a number of networking protocols, such as TCP/IP, NetBIOS, and IPX. Both support a wide variety of network adapters. Both provide the ability to share resources, such as files and printing, through the network. Both provide capability to perform network services, such as DHCP and DNS (Walden, 2003).” The three areas of interest that has been the primary focus for Riordan are the Protocol Stack, Network management, and Compatibility. These are important points to consider when making the decision to switch over from Windows to Linux.…

    • 606 Words
    • 2 Pages
    Good Essays