Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-21 22:23 Eastern Daylight Time Nmap scan report for ROUTER Host is up (0.0038s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp closed domain 1723/tcp closed pptp MAC Address: C8:D7:19:5D:CE:71 (Cisco Consumer Products) Nmap scan report for PHONE Host is up (0.24s latency). Not shown: 998 filtered ports PORT STATE SERVICE 53/tcp closed domain 1723/tcp closed pptp MAC Address: 78:4B:87:C1:3F:B1 (Murata
Premium Linux IP address Time zone
Lab #1 – Assessment Worksheet Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts‚ open ports‚ and services enabled on servers and workstations. In this lab‚ you planned an attack
Premium Management Education Marketing
Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Hunny Tucker Instructor Name: Perry Hood Lab due date: 9/12/13 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the
Premium Router IP address Subnetwork
within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them. You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally‚ you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings. Lab Assessment Questions & Answers 1. What is Zenmap typically
Premium Computer security Security Operating system
identify whether that application starts as a service on the system or must be run manually. Wireshark – manual Nessus Client – manual Nessus Server Manager – can be set up to run at Startup Filezilla Server Interface – starts as a service Zenmap GUI - manual 2. What was the allocated source IP host address for the TargetWindows01 server‚ TargetUbuntu01 server‚ and the IP default gateway router? TargetWindows01 server – 172.30.0.8 TargetUbuntu01 server – 172.30.0.4 IP default gateway
Free Linux Subnetwork Internet Protocol
1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application. Zenmap is an application that is used to scan ports for networks. A scenario where it can be used is to scan the ports of a network to know exactly which ports are opened or closed thus allowing a network administrator to reduce the vulnerability of its network. 2. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan
Premium Computer security Security Operating system
1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application. It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running. 2. What is the relationship between risks‚ threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? Threats and vulnerabilities lead risks‚ if you don’t have then then
Premium Operating system Risk Security
Lab #1 Assessment Questions & Answers 1. Windows Applications Starts As Service Y/N Wireshark N FIleZilla Server Interface Y Nessus Client N Tftpd32_SE Admin N Nessus Server N Nmap Zenmap Gui M 2. What was the DHCP allocated source IP host address for the student VM‚ DHCP Server‚ and IP default gateway router? IP Address………….172.30.0.58 Subnet Mask………255.255.255.0 Default Gateway….172.30.0.1 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an
Premium IP address Dynamic Host Configuration Protocol Subnetwork
connected to a remote Windows machine and explored two file transfer applications‚ FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally‚ you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. FileZilla‚ net witness investigator‚ Open VAS‚PuTTY‚Wireshark. 2. What is promiscuous
Free Performance Performing arts Network topology
Workstation Instructor Name: ________________ Lab Assessment Questions 1. What are the five steps of a hacking attack? 2. During the reconnaissance step of the attack‚ describe what task Zenmap GUI performs to do passive OS fingerprinting. 3. 4. 2 3. What step in the hacking attack process uses Zenmap GUI? 4. What step in the hacking attack process identifies known vulnerabilities and exploits? 5. During the scanning step of the hacking attack process‚ you identified known software
Premium Operating system Windows XP Computer security