Zenmap Gui (Nmap)

In: Computers and Technology

Submitted By livi617
Words 350
Pages 2
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. 1. FileZilla Server Y 2. Internet Explorer N 3. Mozilla Firefox N 4. Nessus Client N 5. Wire Shark Y 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? 1. The IP host is 172.30.0.8. 2. The IP host address is 172.30.0.4. 3. The IP host address is 172.30.0.2. 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes. Four packets. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? TargetWindows01 has Min = 0ms, Max = 0ms, Avg. =0ms. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap-T4-A-v-PE.-P522,25,80 –PA21,23,80,3389.172.30.0.0124 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.1 a. Quick Scan b. Quick Scan Plus c. Quick Traceroute d. Regular Scan e. Slow comprehensive scan 7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. I found six different test performed. APR scan, SYN Stealth Scan, Service Scan, OS detection, Nmap Scan. 8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered…...

Similar Documents

Lab 1.1: Gui vs. Console Programming

...then be executed by a (virtual or physical) machine.  An interpreter reads code in an interpreted language (e.g. PHP, Perl, and Java Script) and directly executes the contained instructions. 7. What type of software controls the internal operations of the computer’s hardware? The programs that control and manage the basic operations of a computer's hardware are generally referred to system software. Lab 1.1: GUI vs. Console Programming 1. What similarities do you see between the two programs? The similarities that I see between the two programs are the way the answers are displayed. Easy display of information typed in. 2. What differences do you see between the two programs? The differences I see are the box setup and themes. 3. What input devices are used in the GUI and console programs? GUI features Mouse pointers, icons, and menus to allow the user a point and click environment. The console programming will create console applications in order to focus on the programming logic behind coding. 4. What output devices are used in the GUI and console programs?  Device contexts, or simply DCs, provide a machine-independent view of various display and printer devices allowing an application to write data to a single "device" yet have that information appear properly on a multitude of different real-world devices....

Words: 454 - Pages: 2

Java Graphical User Interface (Gui) and Design Document

...IT110-1204A-01: Introduction to Programming Java Graphical User Interface (GUI) and Design Document Joseph Mirabal 11/12/2012 Table of Contents Project Outline 3 Class Diagrams 5 Use Case Diagrams 8 Java Fundamentals 10 Java Application Planning Worksheet 10 Final value 10 Java classes used: 11 Java Control Structures 12 Java Application Worksheet 12 Explain what this piece of code is doing: 13 Error Handling and File Input/Output 15 Final Application Design & Screenshots 37 Project Outline The company I am going to hypothetically create will be a sports store dedicated to selling different types of sporting equipment for all types of sports. I will mainly start my store by just selling sports balls. I will call my store Joey’s Sporting Balls and Equipment. I know the name sounds funny, but I am doing that on purpose to catch the attention of my potential customers. I want the name of my store to stick in their minds, and what better way to o than a pun or play on words. I will start off with two types of balls, a football and a basketball. The football will be brown in color, will have white laces, and will come in different sizes according to the level of the athlete and also to have a range in prices. It will range in size from miniature footballs for fun, small for beginners and as gift items, medium or college level, and to a large size for professional athletes, or just people who like to imitate professional athletes for...

Words: 2125 - Pages: 9

Zenmap

...Zenmap Specs * Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap Who’s it for? Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not. What problem does it solve? There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network. Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan......

Words: 251 - Pages: 2

Lab 1.1 Gui vs Console Programming 2

...Introduction to Computers and Programming Lab 1.1: GUI vs. Console Programming 1. What similarities do you see between the two programs? The similarities that I see between the two programs are the way the answers are displayed. Both applications use a monitor. The monitor of a computer is an essential output device that allows you to understand all the tasks that a computer does. Without a monitor you can't see web pages, videos or work on a document. 2. What differences do you see between the two programs? Console applications use text-based program output and keyboard entered user input. Console applications can be faster once the user has learned the system. Command-line interfaces are better for more complex actions, which you want to repeat (and possibly automate) and when you need to operate with many objects. A command line interface typically displays a prompt, and the user types a command, which is then executed. Ina text-based environment, such as a command line interface, programs determine the order in which things happen. GUIs use a graphical window or windows that provide interaction with the user. GUI's accept input from both the keyboard and a mouse, and a variety of other input devices. GUIs are better for using direct manipulation, and for using the selected object to narrow down the range of possible actions. GUIs take more advantage of our ability to quickly perceive and interact with images. In a GUI environment the user......

Words: 508 - Pages: 3

Lab 1.1 Console vs Gui Programming

...Introduction to Computers and Programming Lab 1.1: GUI vs. Console Programming 1. What similarities do you see between the two programs? The similarities that I see between the two programs are the way the answers are displayed. Both applications use a monitor. The monitor of a computer is an essential output device that allows you to understand all the tasks that a computer does. Without a monitor you can't see web pages, videos or work on a document. 2. What differences do you see between the two programs? Console applications use text-based program output and keyboard entered user input. Console applications can be faster once the user has learned the system. Command-line interfaces are better for more complex actions, which you want to repeat (and possibly automate) and when you need to operate with many objects. A command line interface typically displays a prompt, and the user types a command, which is then executed. Ina text-based environment, such as a command line interface, programs determine the order in which things happen. GUIs use a graphical window or windows that provide interaction with the user. GUI's accept input from both the keyboard and a mouse, and a variety of other input devices. GUIs are better for using direct manipulation, and for using the selected object to narrow down the range of possible actions. GUIs take more advantage of our ability to quickly perceive and interact with images. In a GUI environment the user......

Words: 508 - Pages: 3

Perform Reconnaissance and Probing Using Zenmap Gui (Nmap) Using Zenmap Gui (Nmap)

...Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No Splunk Zenmap Nessus OpenOffice Wireshark 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 888 - Pages: 4

Sfafdsafd

...Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many total......

Words: 303 - Pages: 2

Gui vs Console

...Sam Strickland #12577467 Intro to Programming PT1420T Lab 1.1 GUI vs. Console When we look at GUI vs Console, we can see similarities as well as differences. These are usually found in the functionality of both types. Both of them run and execute programs that are installed on their OS. If you enter the command thru either GUI or console, you get the same result. The only difference between these two is the way we, as the user, see it. When using GUI (Graphic User Interface) you actually see some kind of icon or other visual. Usually there is a window or some other way of showing the user that they are in whatever program they execute. If you use the console, it feels like you are back in the 80’s. But if you know the right commands and the right syntax then the user is capable of executing the same programs as if they were using GUI. On the outside they look as different as they are. One has a window or some icon that lets you click a few times and you can execute your file. The “old school” command line is still a good input tool and is still used today in programming and other networking uses. They say it’s easier and faster to execute a command thru the command line but I believe that it’s easier thru GUI. Some people are more adept to learning thru GUI for executing certain commands. But I also think that some commands are better given at the command line. Only because that is how I was taught to view certain information when using a PC....

Words: 277 - Pages: 2

Looking

...Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many total......

Words: 303 - Pages: 2

Network Discovery and Reconnaissance Probing Using Zenmap Gui (Nmap) Chart #2

...Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart......

Words: 431 - Pages: 2

Gui vs Console

...1.1: GUI vs. Console Programming 1. What similarities do you see between the two programs? The similarities that I see between the two programs are the way the answers are displayed. Both applications use a monitor. The monitor of a computer is an essential output device that allows you to understand all the tasks that a computer does. Without a monitor you can't see web pages, videos or work on a document. 2. What differences do you see between the two programs? Console applications use text-based program output and keyboard entered user input. Console applications can be faster once the user has learned the system. Command-line interfaces are better for more complex actions, which you want to repeat (and possibly automate) and when you need to operate with many objects. A command line interface typically displays a prompt, and the user types a command, which is then executed. Ina text-based environment, such as a command line interface, programs determine the order in which things happen. GUIs use a graphical window or windows that provide interaction with the user. GUI's accept input from both the keyboard and a mouse, and a variety of other input devices. GUIs are better for using direct manipulation, and for using the selected object to narrow down the range of possible actions. GUIs take more advantage of our ability to quickly perceive and interact with images. In a GUI environment the user determines the order in which things happen. Because GUI......

Words: 297 - Pages: 2

Nmap Project

...Introduction Nmap can also be known as Network Mapper which is a free and open source license utility for network discovery and security auditing. Nmap uses IP packets to determine what hosts are available on the network, what’s the name of the application and version that hosts are running on, what’s the operating systems and its versions they are running on, what type of packet filters/firewalls are in use, and many of other activities. One of the important features of Nmap is that it scans large networks and works with single hosts. It works on Linux, Windows, and Mac OS X operating systems. Nmap executes on a classic command-line and has a sister tool Zenmap. It is an advanced GUI (Graphical User Interface) tool which gives results of all scanned ports. The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and it also comes with full source code that you may modify and redistribute under the terms of the license. Nmap supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. History According to nmap.org, the history of Nmap did not start from Nmap directly but instead it was Ndiff that was first started as a project by Michael Pattrick during the 2008. Michael designed the program from the scratch and later took his topic......

Words: 1106 - Pages: 5

Linux Gui

...LINUX GUI Roy Dean Jr CIS/255 12 JUL 15 Keagan Samuel Introduction What is a GUI exactly? A GUI is known as a graphical user interface that provides a way to interact with a computer system by choosing items from menus or manipulating pictures drawn on a display screen instead of typing command lines. (Sobell 2014) Now in this day and age we have many options of what we want our computers to do and with Linux there is also options of how we want them to look and run. Primary advantages of GUI over textual interface in Linux One of the primary advantages of GUI over textual interfaces is that, with a GUI you are not restricted to using just characters. A GUI is probably more an advantage for a new user and maybe easier to navigate than the more specific textual interface. Using a GUI is faster than textual interface and this helps people that need to get certain tasks done in a quicker manner. With pictures, menus, and etc. makes it a lot easier for people to see and comprehend than typing in lines of text to make things happen all the time. Fedora/Red Hat Enterprise Linux GUI desktop managers With options at with desktop managers, this gives a user a chance to get the feel of which one is right for them. One of the many desktop options is Xfce. This option is a good option for people that an old-fashioned desktop environment. It is not loaded down with desktop widgets and makes it a good option for people using older computers without a good......

Words: 743 - Pages: 3

Tech Gui

...Windows GUI In the present day, relatively each person in the urbanized world at some point interrelate with some type of computers. Computers are utilized at home and at work, for amusement, information source, and as apparatus to leverage comprehension and aptitude. It is understood whenever any person sits down to use a computer and/or workstation that it will function with some type of graphical user interface. It is expected to interact with it mainly by use of a mouse, initiates programs by clicking on icons, and controls an assortment of windows on the screen using graphical controls. But this was not always the case. Why did computers come to implement the GUI as their most important method of interaction in our day? According to TechTarget (2011), GUI is an acronym for Graphical User Interface, what mainframe types call the system of icons, taskbars, and other objects that computers used to exhibit and access information (p.1). Reminiscent of a lot of progress in regards to the history of computing, some of the thoughts for a GUI computer were thought way before the technology was even obtainable to fabricate such a device. One of the first people to express this thought was Vannevar Bush. In the 1930s, he wrote of a device called "Memex," which he visualized a desk with two touch screen graphical displays and a keyboard. It would permit the end-user to access the knowledge by means of a correlation that is very similar to how hyperlinks work. At......

Words: 1530 - Pages: 7

Bao Hiem Tien Gui

...HIỂM TIỀN GỬI CHÍNH PHỦ Căn cứ Luật Tổ chức Chính phủ ngày 30 tháng 9 năm 1992; Căn cứ Luật Các tổ chức tín dụng số 02/1997/QH10 ngày 12 tháng 12 năm 1997; Theo đề nghị của Thống đốc Ngân hàng Nhà nước Việt Nam, NGHỊ ĐỊNH: Chương 1: NHỮNG QUI ĐỊNH CHUNG Điều 1. Nghị định này quy định về hoạt động bảo hiểm tiền gửi tại Việt Nam nhằm bảo vệ quyền và lợi ích hợp pháp của người gửi tiền, góp phần duy trì sự ổn định của các tổ chức tín dụng, bảo đảm sự phát triển an toàn lành mạnh hoạt động ngân hàng. Điều 2. 1. Các tổ chức tín dụng và tổ chức không phải là tổ chức tín dụng được phép thực hiện một số hoạt động ngân hàng theo quy định của Luật các tổ chức tín dụng có nhận tiền gửi của cá nhân phải tham gia bảo hiểm tiền gửi bắt buộc; 2. Các tổ chức tham gia bảo hiểm tiền gửi phải niêm yết công khai về việc tham gia bảo hiểm tiền gửi tại trụ sở và các địa điểm giao dịch. Điều 3. Tiền gửi được bảo hiểm là Đồng Việt Nam của các cá nhân gửi tại tổ chức tham gia bảo hiểm tiền gửi. Điều 4. 1. Số tiền bảo hiểm được trả cho tất cả các khoản tiền gửi (gồm cả gốc và lãi) của một cá nhân tại một tổ chức tham gia bảo hiểm tiền gửi, tối đa là 30 triệu đồng Việt Nam. 2. Việc thay đổi số tiền bảo hiểm tối đa quy định tại khoản 1 điều này do Thủ tướng Chính phủ quyết định. Điều 5. 1. Tổ chức bảo hiểm tiền gửi là tổ chức tài chính nhà nước hoạt động không vì mục tiêu lợi nhuận, bảo đảm an toàn vốn và tự bù đắp chi phí. Tổ chức bảo hiểm tiền gửi có tư......

Words: 4224 - Pages: 17

Tidelands S01E03 720p WEBRip x264-STRiFE [eztv] | Brave Witches | Ariana Grande Greedy