Preview

week 1 2520

Satisfactory Essays
Open Document
Open Document
261 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
week 1 2520
1.
Windows Application loaded Starts as Service Y/N
Domain Y
Kerberos – sec Y
MSRPC Y
Netbios-SSN Y
Idap Y
Microsoft-ds y

2. DHCP 172.30.0.10
Default Gateway 172.30.0.1
VM 172.30.0.645
3. Sent 14808
Received 12540
4. .
5. Nmap-T4-A-v-PE-P522,25,80-PA21,23,80,3389 172.30.0.0/24
6. Ping Scan
Regular Scan
Quick Scan Plus
Intense Scan no Ping
Intense Scan
7. Arp Scan
Parallel DND
Syn Stealth
Services
OS Detection
NSE
8. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address.
9. 14 Active 68 Total
10. Identifies holes in the Network, open ports and ways to penetrate the network.

1.
Windows Application loaded Starts as Service Y/N
Domain Y
Kerberos – sec Y
MSRPC Y
Netbios-SSN Y
Idap Y
Microsoft-ds y

2. DHCP 172.30.0.10
Default Gateway 172.30.0.1
VM 172.30.0.645
3. Sent 14808
Received 12540
4. .
5. Nmap-T4-A-v-PE-P522,25,80-PA21,23,80,3389 172.30.0.0/24
6. Ping Scan
Regular Scan
Quick Scan Plus
Intense Scan no Ping
Intense Scan
7. Arp Scan
Parallel DND
Syn Stealth
Services
OS Detection
NSE
8. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address.
9. 14 Active 68 Total
10. Identifies holes in the Network, open ports and ways to penetrate the network.

1.
Windows Application loaded Starts as Service Y/N
Domain Y
Kerberos – sec Y
MSRPC Y
Netbios-SSN Y
Idap Y
Microsoft-ds y

2. DHCP 172.30.0.10
Default Gateway 172.30.0.1
VM 172.30.0.645
3. Sent 14808
Received 12540
4. .
5. Nmap-T4-A-v-PE-P522,25,80-PA21,23,80,3389 172.30.0.0/24
6. Ping Scan
Regular Scan
Quick Scan Plus
Intense Scan no Ping
Intense Scan
7. Arp Scan
Parallel DND
Syn Stealth
Services
OS Detection
NSE
8. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address.
9. 14 Active 68 Total
10. Identifies holes in the Network, open ports and ways to penetrate the

You May Also Find These Documents Helpful

  • Powerful Essays

    In the Screenshot above, cdn2 has a different IP (54.230.2.234) in one case and cdn0 also has a different IP (54.230.3.190) for three different objects. o Now, because we parse har file w.r.t host name and pcap w.r.t IP, all three of cdn0, cdn2, cdn3 have same TCP connections in the table as they have same IPs. o Better way to read this would be to consider only non-zero download size connections for each of these three domains. Haven’t implemented it to avoid irregularity in the table.…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw 310 Lab #1

    • 257 Words
    • 2 Pages

    6. Inside the circle marked as Pattern 3, is this a signal from one of the three unlicensed signal ranges?…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    (167) Command issued to upgrade an old version of the Cisco IOS software by downloading a new image from the TFTP server…

    • 469 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    3. Indicators: There has been no overt CBRNE activity. The enemy has a CB capability but weapons have not been dispersed or deployed.…

    • 988 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw310Labreport Week 1

    • 301 Words
    • 2 Pages

    6. Inside the circle marked as Pattern 3 is this a signal from one of the three unlicensed signal ranges? Yes it is…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Poirot received a telegram from that he is needed in London as soon as possible. He booked the next train, the Orient Express, for that evening. It was not planned, just a coincidence that he was on the train. When Poirot saw that Colonel Arbuthnot and Miss Debenham were also on the train he became even more suspicious of the two.…

    • 1266 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sedgman

    • 576 Words
    • 3 Pages

    Isaak Theissen asked Alice to investigate the situation. She paid a visit to the warehouse and was surprised with what she saw.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cebu Collision

    • 300 Words
    • 2 Pages

    Captain Reynan Bermejo of St. Thomas Aquinas said he was traversing the inbound lane on the way to Cebu when he noticed in the radar that another ship was in the same lane.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays