Preview

paper

Good Essays
Open Document
Open Document
362 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
paper
Lab #1 – Assessment Worksheet

Lab Assessment Questions & Answers

1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually.
Windows Application Loaded Starts as Service Y/N
1. putty q Yes q No
2. wireshare q Yes q No
3. netwiness investigation q Yes q No
4. Nmap Zenmap GUI q Yes q No
5. Nessus Server Manager q Yes q No

2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? 172.30.0.8 / 172.30.0.1
Ga
3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, 4 were sent and 4 were received.

4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? Time

5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of
172.30.0.0/24?

nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24

6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.

Intense Scan, intense scan plus UDP, intense scan, all TCP ports, intense scan no ping, ping scan, quick scan, regular scan.

7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. 5

8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report.

Nmap Output - Raw Nmap outdata
Ports/Hosts - IP hosts and open ports
Topology - Fisheye bubble chart of IP hosts
Host Details - IP host OS fingerprint details
Scans - Completed

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 8.1.5)The Slash notation for the Subnet is /24| the slash is /9 and the way I found out is looking at the webpages that were provided.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    7. Which type of ICMP message will be returned to host by a remote router if that router does not have a route to a network?…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 9: The source machine will update its ARP cache with the Sender Hardware Address and Sender Protocol Address it received from the…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW204 Week 4 iLab

    • 616 Words
    • 3 Pages

    Task 6, Step 6: Paste a screenshot of the results from the ping commands. (1 point)…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    8. Why is it unlikely that you will fi nd the IP address 192.168.250.10 on the Internet?…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Lab1

    • 97 Words
    • 1 Page

    8 - Nbstat gets the NetBIOS name, NetBIOS User, and NetBIOS MAC. Smb-os-discovery gets the OS, name and system time.…

    • 97 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IST 220

    • 369 Words
    • 2 Pages

    5: Describe the CSMA/CA+ACK protocol. Do not go into details about how long a host must wait to transmit if there is no traffic. (8 pts)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Section 1Computing Usable Subnets and Hosts vLab—40 Points Total * Task 1 * Task 2 * Summary Paragraph…

    • 1560 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Nmap

    • 703 Words
    • 3 Pages

    Theory:- Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.…

    • 703 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    * Scanning: this phase involves determining which hosts in the targeted network are alive and reachable (through ping sweeps), which services they offer (through port scanning) and which operating systems they run (operating system (OS) fingerprinting);…

    • 9158 Words
    • 37 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapquiz5

    • 646 Words
    • 3 Pages

    Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1?…

    • 646 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CCNP Strategy

    • 2264 Words
    • 15 Pages

    If client can ping 10.1.1.1 or 10.1.1.2, u have 4TTs (All TTs are on R1)…

    • 2264 Words
    • 15 Pages
    Satisfactory Essays
  • Powerful Essays

    Contents Subnetting Discussion Network Drawing Router Configuration Table ACME R1 ACME R2 OMEGA R1 Hostname ACME_R1 ACME_R2 OMEGA_R1 Console Password Cisco Cisco Cisco Secret Password Cisco Cisco Cisco VTY Password Cisco Cisco Cisco Serial 0/0 IP Address/Subnet Mask 144.2.21.66/30 144.2.21.65/30 144.2.21.69/30 Serial 0/0 Clockrate 64000 64000 64000 Serial 0/0 Description Connection to ACME_R2 Connection to ACME_R1 Serial port OMEGA_R1 Serial 0/1 IP Address/Subnet Mask 144.2.21.70/30 Serial 0/1 Clockrate 64000 Serial 0/1 Description Connection to OMEGA_R1 FastEthernet 0/0 IP Address/Subnet Mask 144.2.0.1/20 144.2.20.1/24 207.9.2.65/27 Loopback 0 IP Address/Subnet Mask 144.2.16.1/22 144.2.21.1/26 207.9.2.97/28 Loopback 0 Description On ACME_R1 On ACME_R2 On OMEGA_R1 Loopback 1 IP Address/Subnet Mask 207.9.2.1/26 207.9.2.113/29 Loopback 1 Description On ACME_R1 On OMEGA_R1 Interfaces to Enable fa, se, lo fa, se, lo Routing Protocols Enabled RIPv2, EIGRP…

    • 2170 Words
    • 9 Pages
    Powerful Essays