Lab#1 Assesment Hands-on Steps

In: Computers and Technology

Submitted By mayasa30
Words 2926
Pages 12
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Introduction
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will plan an attack on 172.30.0.0/24 where the VM server farm resides, and use the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.

LAB

1

Learning Objectives
Upon completing this lab, you will be able to:
• Access the virtual machines (server farm and workstations) needed for the labs in this course • Use the vWorkstation to connect to the applications and virtual machines needed for this lab • Plan an initial reconnaissance and probing attack on the Virtual Security Cloud Lab (VSCL) • Use Zenmap GUI (Nmap) to perform an “Intense Scan” on the entire targeted VSCL infrastructure (172.30.0.0/24) • Generate a Zenmap GUI (Nmap) port scanning report and submit it as part of the deliverables for this lab

Tools and sofTware
Name FileZilla Server and FileZilla Client Nessus NetWitness Investigator PuTTY Tftpd32 Wireshark Zenmap GUI more INformatIoN http://filezilla-project.org/ http://www.nessus.org/products/nessus http://www.emc.com/security/rsa-netwitness.htm http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://tftpd32.jounin.net/ http://www.wireshark.org/ http://nmap.org/zenmap/

1

37609_LB01_Pass4.indd 1

21/04/13 2:46 PM

2

Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)

Deliverables
Upon completion of this lab, you are required to provide the following deliverables to your instructor:
1. Soft copy of the Zenmap GUI “Intense Scan” report in XML format; 2. Topology…...

Similar Documents

Lab 1. What Are the Five Steps of a Hacking Attack?

...1 1. List the 5 steps of the hacking process. 1—Reconnaissance 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan? The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step? Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target. 6. Explain how an attacker will avoid being detected following a successful penetration attack? To avoid detection a good hacker will...

Words: 752 - Pages: 4

Lab 1. What Are the Five Steps of a Hacking Attack?

...Lab 1. What Are the Five Steps of a Hacking Attack? 1 1. List the 5 steps of the hacking process. 1—Reconnaissance 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan? The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step? Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target. 6. Explain how an attacker will avoid being detected following a successful penetration...

Words: 347 - Pages: 2

Lab 1 Assesment Question

...Lab 1 Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. 1. FileZilla Server Y 2. Internet Explorer N 3. Mozilla Firefox N 4. Nessus Client N 5. Wire Shark Y 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? 1. The IP host is 172.30.0.8. 2. The IP host address is 172.30.0.4. 3. The IP host address is 172.30.0.2. 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes. Four packets. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? TargetWindows01 has Min = 0ms, Max = 0ms, Avg. =0ms. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap-T4-A-v-PE.-P522,25,80 –PA21,23,80,3389.172.30.0.0124 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.1 a. Quick Scan b. Quick Scan Plus c. Quick Traceroute d. Regular Scan e. Slow comprehensive scan 7. How many......

Words: 428 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 467 - Pages: 2

Is3220 Lab 1 Assesment Questions

...Lab 1 Assessment Questions 1. What is the purpose of the address resolution protocol (ARP)? A – IP to host name resolution, host name to IP address resolution, Mac to IP address resolution, and IP to Mac address resolution. 2. What is the purpose of the dynamic host control protocol (DHCP)? A – To issue IP addresses dynamically to clients in a certain IP range. 3. What was the DHCP allocated source IP host address for the Student VM and Target VM? A – 172.16.8.101 – Student VM, Target switch 172.16.8.1 and 172.16.8.5 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? A – Source IP address is 172.16.0.105 and destination IP address is 172.16.8.115 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-request packets were sent back to the IP source? A – Yes and 4 replies. 6. Find a TCP 3-way handshake for a TELNET, FTP, or SSH session. What is the significance of the TCP 3-way handshake? A – FTP transfers file across internet to server, server guarantees sent file is not malicious and checks senders information, server sends back the ok message that they are then connected if credentials and file are validated, and they are now both communicated. TELNET sends IP addressing information towards server, server checks it, if ok, sends message back to client it’s ok to transfer,......

Words: 447 - Pages: 2

Lab 1

...Lab 1: Input, Processing, and Output This lab accompanies Chapter 2 of Starting Out with Programming Logic & Design. Name: ___________________________ Lab 1.1 – Algorithms This lab requires you to think about the steps that take place in a program by writing algorithms. Read the following program prior to completing the lab. Write a program that will take in basic information from a student, including student name, degree name, number of credits taken so far, and the total number of credits required in the degree program. The program will then calculate how many credits are needed to graduate. Display should include the student name, the degree name, and credits left to graduate. Step 1: Examine the following algorithm. (Reference: Designing a Program, page 31). 1. Get the student name. 2. Get the degree program name. 3. Subtract the number of credits taken so far from the required credits for the degree. 4. Get the number of credits required for the degree program. 5. Get the number of credits the student has taken so far. 6. Display the input information in Step 1 and 2. 7. Display the calculated information. Step 2: What logic error do you spot and how would you fix it? Step 3: What steps require user interaction (Ex: user must type in some input)? Lab 1.2 – Pseudocode This lab requires you to think about the steps that take place in a program by writing pseudocode. Read the following......

Words: 2451 - Pages: 10

Lab 2 Assesment Worksheet

...Lab 2 Assessment Worksheet 1. A. Denial of Service attack on organization’s email server Medium Risk B. Fire destroys primary data center High Risk C. Loss of Production Data High Risk 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are effective? 3. A. Denial of Service attack on organization’s email server Threat to Availability B. Fire Destroys Data Center Threat to Integrity and Availability C. Loss of Production Data Threat to Integrity and Availability 4. Effectiveness, Efficiency, Compliance, and Reliability secondary. 5. A. Denial of Service Information- Information would not be able to be accessed to end users from outside the primary server control. By adding firewalls and limiting access to certain IPs, the risk can be lessened. Applications- Deny access to necessary applications needed by the organization. Can be mitigated as stated above by firewall procedures to limit IPs. Infrastructure- Access from remote terminals will be very limited. Firewalls should be installed to help limit which IPs have access. People- Will have limited access to the organization’s server. Contact their local IT manager to give them access to the server by allowing their IP through. B. Fire Destroys Data Center Information- Information will be destroyed by the fire. Back up data to an offsite server/hard drive to have a fall back plan. Applications- Applications will......

Words: 515 - Pages: 3

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see......

Words: 3168 - Pages: 13

Lab 3 Assesment

...IS3110/ Risk Management Lab #3/ Assessment Worksheet 1. What is the goal or objective of an IT risk management plan? To define how risks will be managed, monitored and controlled throughout the project 2. What are the five fundamental components of an IT risk management plan? A hazard assessment, prevention elements management system feedback process, and emergency response program 3. Define what risk planning is. A document that a project manager prepares to foresee risks, estimate impacts, and define responses to issues 4. What is the first step in performing risk management? Planning Risk Management 5. What is the exercise called when you are trying to identify an organization’s risk health? Global Health Risks 6. What practice helps reduce or eliminate risk? The process of risk management 7. What on-going practice helps track risk in real-time? Information Security Continuous Monitoring 8. Given that an IT risk management plan can be large in scope, why is it a good idea to development a risk management plan team? The purpose of the risk management plan is to define how risks will be managed, monitored and controlled throughout the project. 9. Within the seven domains of atypical IT infrastructure, which domain is the most difficult to plan, identify, assess, remediate, and monitor? LAN-to-WAN 10. From your scenario perspective, with which compliance law or standard does your organization have to comply? How did...

Words: 461 - Pages: 2

Properties of Gases Labpaq Hands-on Labs

...Properties of Gases Peter Jeschofnig, Ph.D. Version 42-0189-00-01 Lab Report Assistant This document is not meant to be a substitute for a formal laboratory report. The Lab Report Assistant is simply a summary of the experiment’s questions, diagrams if needed, and data tables that should be addressed in a formal lab report. The intent is to facilitate students’ writing of lab reports by providing this information in an editable file which can be sent to an instructor. Observations Make a table of the gases studied. Tabulate their colors, the effect on lighted or glowing splints, and other properties one might use to identify them. | | |Data Table: Experiment Results | |Gas |Flame |Glowing |Limewater |Bromothymol | | |reaction |splint |reaction |blue reaction | |Hydrogen |Bright orange | | | ...

Words: 356 - Pages: 2

Cs 102 Hands on Lab

...CMIS 102 Hands-On Lab // Week 3 Overview: This hands-on lab allows you to follow and experiment with the critical steps of developing a program including the program description, analysis, test plan, design (using both flow chart and pseudocode visualization), and implementation with C code. The example provided uses sequential and selection statements. Program Description: This program will calculate the area of a right triangle. The program will ask the user to enter the base and height and then use these values to calculate and then print the area of the triangle. If the area of the triangle is greater than 100 square units, an additional message is printed stating the triangle is too large for the specification. However; if the triangle is less than or equal to 100 square units, the additional message will state the triangle is within specifications. The design step will include both pseudocode and flow chart visualization. Analysis: I will use sequential and selection programming statements. I will define two float numbers for the base and height: base, height. Float numbers were selected as opposed to integers to make sure triangles of all dimensions are possible and not just whole numbers. Float number will store the area: area The area will be calculated by this formula: Area = ½ * (base * height) For example if the base was 4.2 and the height was 5.3 the area would be calculated as: Area = ½ * (4.2 * 5.3) = ½ * (22.26) = 11.13 The additional......

Words: 723 - Pages: 3

Nt2580 Lab#1 Assesment

...NT2580 Lab#1 – Assessment Worksheet WITH PICTURES ADDED. 1. Name at least five applications and tools used in the lab. Introduction: Wireshark, NetWitness, OpenVAS, FileZilla, Tftpd64, PuTTY and Zenmap 2. What is promiscuous mode? Promiscuous mode allows applications to listen to all traffic on given subnets and VLAN. 3. How does Wireshark differ from NetWitness Investigator? Wireshark captures live traffic and displays results at packet level. NetWitness Investigator allows an overview of previously captured traffic which can be used to spot anomalies, compliance issues, and Denial of Service attacks. 4. Why is it important to select the student interface in the Wireshark? It is important to enable the student lab environment. Choosing the Public network will prevent Wireshark from seeing traffic that is related to the lab and cause a lot of clutter. 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v 172.30.0.0/24 6. Name at least five different scans that may be performed with Zenmap. Intense scan, Intense scan plus UDP, Intense scan all TCP ports, Intense scan no ping, Ping scan, Quick Scan, Quick Scan Plus, Quick Traceroute, Regular Scan, Slow comprehensive scan 7. How many different tests (i.e., scripts) did your Intense Scan perform? Ping (or Arp Ping), TCP Port Scan (SYN Stealth), Service Scan, Operating System Detection (OS detection), & Traceroute. 8. Based on your......

Words: 356 - Pages: 2

Hands on Lab 5

...Hands-on lab week 5 March 25, 2016 20 integers change code to average 20 integers In order to change the number of integers it was only necessary to change the number of times the loop would run. This is because for each iteration of the loop it takes into account one integer. So I changed the condition to reflect 20 instead of 10 rounds. Test table Prepare 3 distinct cases 20 Integer Test Table Run Input Expected Output 1 Value 10 Value 20 Value 30 Value 40 Value 50 Value 60 Value 70 Value 80 Value 90 Value 5 Value 15 Value 25 Value 35 Value 45 Value 55 Value 65 Value 75 Value 85 Value 95 Value 100 52.5 2 Value 23 Value 6 Value 9 Value 12 Value 5 Value 10 Value 15 Value 20 Value 25 Value 2 Value 4 Value 6 Value 8 Value 10 Value 4 Value 8 Value 12 Value 165 Value 275 Value 2421 152 3 Value 1 Value 2 Value 3 Value 4 Value 5 Value 6 Value 7 Value 8 Value 9 Value 1 Value 2 Value 3 Value 4 Value 5 Value 6 Value 7 Value 8 Value 9 Value 1 Value 2 4.65 Changing Values try entering values other than an integer Here I tried entering the letters a-t and it returned a negative number. Next I tried using strings and finally floats. My results are in the screen shots below: Unspecified integers change code to average an unspecified number of integers This portion presented quite a bit of difficulty for me. I did not save all my variations of code as I assumed I would figure it out in time to......

Words: 500 - Pages: 2

Watch movie | Nhạc dance, remix | 5.2 Touch Chesi Chudu (2018) WEB-DL