Perform Reconnaissance and Probing Using Zenmap Gui (Nmap) Using Zenmap Gui (Nmap)

In: Computers and Technology

Submitted By martineztherock
Words 888
Pages 4
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap)

LAb #1 – ASSESSMENT WORKSHEET

Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Course Name and Number: Student Name: Instructor Name: Lab due date:

Overview
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.
Note:
These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program.

Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify

whether that application starts as a service on the system or must be run manually.

windows applicaTion loaded
1. 2. 3. 4. 5.

sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No

Splunk Zenmap Nessus OpenOffice Wireshark

16

Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,

LAN Switch 2, and the IP default gateway router?
IP Address of TargetWindows01 Server: 172.30.0.8 LAN Switch 1: 172.16.8.5 LAN Switch 2: 172.16.20.5 IP default gateway router: 172.30.0.1

3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when…...

Similar Documents

Zenmap

...Zenmap Specs * Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap Who’s it for? Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not. What problem does it solve? There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network. Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan......

Words: 251 - Pages: 2

Form

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: ITSY 1400 Information Systems Security Fundamentals student Name: Leo R Wilson II Instructor Name: Stephanie Jones Lab due date: December 8, 2013 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the......

Words: 588 - Pages: 3

Zenmap Gui (Nmap)

...“ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes. Four packets. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? TargetWindows01 has Min = 0ms, Max = 0ms, Avg. =0ms. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap-T4-A-v-PE.-P522,25,80 –PA21,23,80,3389.172.30.0.0124 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.1 a. Quick Scan b. Quick Scan Plus c. Quick Traceroute d. Regular Scan e. Slow comprehensive scan 7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. I found six different test performed. APR scan, SYN Stealth Scan, Service Scan, OS detection, Nmap Scan. 8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address. The Service Scan and PRCGrind Scan scanned services on the IP......

Words: 350 - Pages: 2

Perform Reconnaissance

...Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. Windows Application Loaded Starts as Service Y/N 1. Filezilla, Yes 2. Wireshark, Yes 3. Firefox, No 4. Internet Explorer, No 5. Nessus Client, No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default gateway router?  TargetWindows01 Server – 172.30.0.8  LAN Switch 1 – 172.16.8.5  LAN Switch 2 Server – 172.16.20.5  Default Gateway Router – 172.30.0.1 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes, there was a response of 4 packets. 4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 173.30.0.0/24 5. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.  Quick Scan – Fast network scan.  Regular Scan – Basic network scan.  Intense Scan – Slower, more thorough scan.  Ping Scan –...

Words: 380 - Pages: 2

Labs

...Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) LAB #3 – ASSESSMENT WORKSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5.......

Words: 303 - Pages: 2

Perform Reconnaissance and Probing

...Assessment Worksheet 15 LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop,......

Words: 445 - Pages: 2

Network Security

...Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5.......

Words: 303 - Pages: 2

Sfafdsafd

...Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5.......

Words: 303 - Pages: 2

Looking

...Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5.......

Words: 303 - Pages: 2

Performing Network Reconnaissance Using Common Tools

...Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Introduction to Information Security Course Name and Number: _____________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. OpenVas, Wireshark, ZenMap, Putty, Tftpd64 and NetWitness. 2. What is promiscuous mode? Promiscuous mode is a mode for NIC or WNIC that cause the controller to pass all traffic it receives to the CPU "Promiscuous mode allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN). Without this option Wireshark would only capture packets to and from the vWorkstation." 3. How does Wireshark differ from NetWitness Investigator? "Wireshark offers a deep-dive into individual packets, NetWitness offers a high-level view that can be stored and compared to newer packet captures to...

Words: 462 - Pages: 2

Network Discovery and Reconnaissance Probing Using Zenmap Gui (Nmap) Chart #2

...and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using......

Words: 431 - Pages: 2

Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools CPSC 2106 Informations Systems Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. 2. What is promiscuous mode? Promiscuous mode allows an application to listen to all traffic on a given subnet or VLAN. 3. How does Wireshark differ from NetWitness Investigator? Wireshark captures live traffic and displays results at the packet level. Net Witness Investigator provides an aggregated overview of previously captured traffic which can be...

Words: 452 - Pages: 2

Lab #1 – Assessment Worksheet. Performing Reconnaissance and Probing Using Common Tools

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Wireshark, Netwitness, Openvas, Filezilla, Tftpd64, Putty and Zenmap 2. What is promiscuous mode? Promiscuous mode allows an application to listen to all traffic on a given subnet or VLAN 3. How does Wireshark differ from NetWitness Investigator? Wireshark deep-dives into individual packets while Netwitness is just a high-level view, that can be compared to newer pracket......

Words: 481 - Pages: 2

Lab 1 Performing Reconnaissance and Probing

...Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Principals of Information Assurance CIS2350 Course Name and Number: _____________________________________________________ Shane Grogan Student Name: ________________________________________________________________ Timothy Pintello Instructor Name: ______________________________________________________________ Unknown Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Five applications and tools used in the lab were: Wireshark, Zenmap, Netwitness, Putty, and Remote Desktop. Bonus: OpenVAS 2. What is promiscuous mode? Promiscuous mode allows your network adapter to receive packets intended for any address, not just the address assigned to the adapter. 3. How does......

Words: 504 - Pages: 3

Nmap Project

...Introduction Nmap can also be known as Network Mapper which is a free and open source license utility for network discovery and security auditing. Nmap uses IP packets to determine what hosts are available on the network, what’s the name of the application and version that hosts are running on, what’s the operating systems and its versions they are running on, what type of packet filters/firewalls are in use, and many of other activities. One of the important features of Nmap is that it scans large networks and works with single hosts. It works on Linux, Windows, and Mac OS X operating systems. Nmap executes on a classic command-line and has a sister tool Zenmap. It is an advanced GUI (Graphical User Interface) tool which gives results of all scanned ports. The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and it also comes with full source code that you may modify and redistribute under the terms of the license. Nmap supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. History According to nmap.org, the history of Nmap did not start from Nmap directly but instead it was Ndiff that was first started as a project by Michael Pattrick during the 2008. Michael designed the program from the scratch and later took his topic......

Words: 1106 - Pages: 5