Preview

School

Satisfactory Essays
Open Document
Open Document
629 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
School
Assessment Worksheet

15

1
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap)

LAb #1 – ASSESSMENT WORKSHEET

Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Course Name and Number: Student Name:
Hunny Tucker

Instructor Name:
Perry Hood

Lab due date:
9/12/13

Overview
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.
Note:
These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program.

Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify

whether that application starts as a service on the system or must be run manually.

windows applicaTion loaded
1. 2. 3. 4. 5.

sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No

tftpd32 filezilla wireshark Nessus NetWitness Investigator

16

Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,

LAN Switch 2, and the IP default gateway router?
TagetWindows01 Server- Source IP = 172.30.0.8 TargetUbuntu01 Server – Source IP = 172.30.0.4 TargetUbuntu02 Server – Source IP = 172.30.0.9 The Default Gateway IP is = 172.30.0.1

3. Did the targeted IP hosts respond to the ICMP echo-request packet

You May Also Find These Documents Helpful

  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    3. How does a client application identify a server application on another computer on the…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw204Week4

    • 1310 Words
    • 6 Pages

    Section 1Subnetting IP Address, Configuring Static Routes and Static Host Table - 15 Points * Task 6: Step 1 * Related Explanation or Response * Task 6: Step 3 * Related Explanation or Response * Task 6: Step 5 * Related Explanation or Response * Task 6: Step 6 * Related Explanation or Response * Summary Paragraph…

    • 1310 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Comp 230 Windows Cli

    • 1077 Words
    • 5 Pages

    Microsoft Windows [Version 6.1.7600]Copyright (c) 2009 Microsoft Corporation. All rights reserved.C:\Users\Administrator>ipconfig /allWindows IP Configuration Host Name . . . . . . . . . . . . : vlab-PC1 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : NoEthernet adapter Local Area Connection 3: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter #4 Physical Address. . . . . . . . . : 00-0C-29-BB-B2-32 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::9977:a3e2:44b2:7105%23(Preferred) Autoconfiguration IPv4 Address. . : 169.254.113.5(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 385879081 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-14-EE-13-98-00-0C-29-DB-1B-7E DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1 fec0:0:0:ffff::2%1 fec0:0:0:ffff::3%1 NetBIOS over Tcpip. . . . . . . .…

    • 1077 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Ceh Cheat Sheet

    • 3910 Words
    • 16 Pages

    Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records…

    • 3910 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    whether that application starts as a service on the system or must be run manually.…

    • 1258 Words
    • 6 Pages
    Good Essays
  • Good Essays

    school

    • 302 Words
    • 2 Pages

    he v-shaped pattern often occurs in the area where a fire originated, so it is possible that the space heater was the fire of origin (tests needs to be run to confirm). The crazed glass (by lab results) indicated that crazing is the result of rapid cooling of hot glass by the application of water. The protected surface shows there was an object on the floor protecting the area, What physical evidence did you find at the victim’s home?…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    School

    • 2389 Words
    • 10 Pages

    2. Attenuation is fine tuning of gene regulation of operons for enzymes associated with anabolic (chemical building) pathways, such as the Trp operon for tryptophan synthesis. Which of the following is NOT true about this system:…

    • 2389 Words
    • 10 Pages
    Good Essays
  • Better Essays

    Nmap

    • 703 Words
    • 3 Pages

    Theory:- Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.…

    • 703 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Assessment of Blue Nile

    • 2906 Words
    • 12 Pages

    | |Build Your Own Feature - more and more online jewelry retailers have a feature for shoppers |…

    • 2906 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    School

    • 3570 Words
    • 15 Pages

    Introduction: Cells can be very difficult entities to study. They are usually very small and transparent, yet extremely complex. Fortunately, there are many tools available to the cell biologist that aid in their study. The light microscope is to this day perhaps the single most important instrument used in Cell Biology. It is used under bright field conditions to study the organization of cells in fixed and stained sections of tissues. With phase contrast optics it is possible to monitor the movements of living cells and to observe changes in their subcellular organization. The light microscope may also be used to monitor certain operations such as cell fractionation and biochemical characterization of cellular components. See the following pages in ECB3 for more useful information: Microscopy: p. 6 -11 Characteristics of cell types: much of Chapter 1, see especially Panel 1-2 Cell Cultures: p. 157 and 161…

    • 3570 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Dns Client Diagnostic

    • 1553 Words
    • 7 Pages

    | Query [www.microsoft.com] against DNS Server 192.168.1.1, (Type = 0x1, Options = 0x10e8) returns 0x232d…

    • 1553 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    SCHOOL

    • 3318 Words
    • 14 Pages

    distinctive, both in terms of its historical development, and of its likely future shape. This…

    • 3318 Words
    • 14 Pages
    Best Essays
  • Good Essays

    School

    • 301 Words
    • 2 Pages

    In 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an objeIn 1687, aIn 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as tIn 1687, a man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. he law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. man named Sir Issac Newton created a series of three laws called Newton's three laws of Motion. The first law is commonly known as the law of inertia. This law states that an object that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force. ct that is at rest will stay at rest, and an object that is in motion will stay in motion unless acted on by an unbalanced force.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    School

    • 6658 Words
    • 27 Pages

    A Hiligaynon chant traditionally sung during Lent in the province of Antique is heard next. This is performed…

    • 6658 Words
    • 27 Pages
    Good Essays
  • Good Essays

    school

    • 955 Words
    • 4 Pages

    Question 2 : The school considering a new system that will speed up the registration process. As a system analyst you are asked to develop a plan for fact-finding.…

    • 955 Words
    • 4 Pages
    Good Essays