Course Name and Number | IA 5010 Foundations of Information Assurance | Student Name | Vishal Gori | Instructor Name | Prof. Themis Papageorge | Lab Due Date | 19th Sept. 2013 |
Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED | STARTS AS SERVICE Y/N | Filezilla | Y | Nessus Server Manager | N | NetWitness Investigator | N | The Wireshark Network Analyzer | N | Zenmap | N |
2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,
LAN Switch 2, and the IP default gateway router? | IP | TargetWindows01 server | 172.30.0.8 | LAN Switch 1 | 172.16.8.5 | LAN Switch 2 | 172.16.20.5 | Default gateway | 172.30.0.1 |
3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?
>> Yes, all 4 packets sent were received back to the source with 0% loss.
4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of
172.30.0.0/24?
>> nmap –T<0-5> -A –v –PE –PS –PA
-T<0-5>: Set timing template higher is faster
-A: Enables OS detection and Version detection, script scanning and traceroute. -v: Increase verbosity level (use -vv or more for greater effect) -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes -PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc.
5. Name at least five different