This website uses cookies to ensure you have the best experience. Learn more

Lab 1 Performing Reconnaissance And Probing

518 words - 3 pages

Lab #1 – Assessment Worksheet
Performing Reconnaissance and Probing Using Common Tools
Principals of Information Assurance CIS2350
Course Name and Number: _____________________________________________________
Shane Grogan
Student Name: ________________________________________________________________
Timothy Pintello
Instructor Name: ______________________________________________________________
Unknown
Lab Due Date: ________________________________________________________________

Overview
In this lab, you explored the common tools available in the virtual lab environment. You used
Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You
reviewed a sample collection of data using NetWitness Investigator, connected to a remote
Windows machine, and explored two file transfer ...view middle of the document...

3. How does Wireshark differ from NetWitness Investigator?
Wireshark captures the packets on the network, NetWitness Investigator allows you to review a report of the
packets captured, and what they contain (in an easier to read format)

4. Why is it important to select the student interface in the Wireshark?
According to the network topology map, all computers on the network are in the 172.30.0.0/24 subnet, choosing
the Public interface in wireshark would result in scanning the 10.10.10.0/? subnet, which would not be very
helpful for this lab.

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of
172.30.0.0/24?
nmap -T4 -A -v 172.30.0.0./24

2 | Lab #1: Performing Reconnaissance Using Common Tools
6. Name at least five different scans that may be performed with Zenmap.
Five different scans that may be performed with Zenmap:
Intense, Ping, Quick, Regular, and Slow comprehensive.

7. How many different tests (i.e., scripts) did your Intense Scan perform?
SYN Stealth, ARP Ping, Service Scan, Nmap, and OS detection

8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script
performed during the report.
A SYN scan sends a packet to see if a response is given, ARP Ping tests to see if a host on the local network is
up. Service scan will scan to see if any services are running like http, or ftp. Nmap creates a map of the network,
and OS detection detects what operating system is running on the host.

9. How many total IP hosts did Zenmap find on the network?
Zenmap scanned 256 IP addresses, of which it found 6 total IP hosts that were up.

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

Other Papers Like Lab 1 Performing Reconnaissance and Probing

Lab#1 Assesment Hands-on Steps Essay

2986 words - 12 pages ://filezilla-project.org/ http://www.nessus.org/products/nessus http://www.emc.com/security/rsa-netwitness.htm http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://tftpd32.jounin.net/ http://www.wireshark.org/ http://nmap.org/zenmap/ 1 37609_LB01_Pass4.indd 1 21/04/13 2:46 PM 2 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Deliverables Upon completion of this lab, you are required to provide the following deliverables

Monkeys Essay

307 words - 2 pages Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap

Nt2580 Lab 1

839 words - 4 pages Lab #1 – Assessment Worksheet Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Course Name & Number: Overview Hackers traditionally follow a 5-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying your target and learning as much as possible about the target. Hackers traditionally perform an initial reconnaissance & probing scan to identify IP

Nt2580 Unit 1

3775 words - 16 pages Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment

Blank

258 words - 2 pages © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date

Vulnerability Assessment Scan

572 words - 3 pages ------------------------------------------------- Lab Assignment for Chapter 3 Performing a Vulnerability Assessment Course Name and Number: Student Name: Student Number: Instructor Name: Onook Oh Submission Due by: 11:59PM on February 3rd, 2015 ------------------------------------------------- Overview To complete the Lab Assignment for Chapter 3, students should first carefully read the “Introduction” information in the lab

It255 Assignment 9.1

326 words - 2 pages Phases of a computer attack Phase 1 - Reconnaissance Phase 2 - Scanning Phase 3 - Gaining Access Phase 4 - Maintaining access Phase 5 - Covering Tracks Phase 1: Passive and Active Reconnaissance Passive reconnaissance: This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work. It can also be the result of researching the company

Hacking and Countermeasures

701 words - 3 pages 1. List five steps of the hacking process? 1— 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attacks the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? I would do some reconnaissance such as look tough the trash for info on the network. This would allow me to gather

Chapter 5

272 words - 2 pages level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level. Lab Assessment Questions & Answers 1. Why would a network administrator use Wireshark and NetWitness Investigator together? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol

Networking 204 Week 2 Lab Report

818 words - 4 pages Instructions for successfully completing NETW204 Labs and Lab Reports: 1. Make sure that you understand the objective of the lab(s) and the requirements for successfully performing them. 2. Use this Lab Report template for all of your labs. Do not turn in separate documents for each lab or create your own document! Each lab is easily identified within this document. Note: It is a good idea to read over this template before

Common Lab Tasks

2403 words - 10 pages in this tab includes the assessment questions for this lab. They are included as a deliverable for every lab. It is recommended that you review these questions prior to performing the hands-on steps. Assessment Figure 3 Lab Navigator 1. In the left pane, click each tab to familiarize yourself with the content of the lab before proceeding with the Hands-on Steps. 2. Click the Intro tab to begin the virtual lab. © 2014 by Jones & Bartlett

Related Essays

Lab 1: Microscopy And The Metric System

870 words - 4 pages Lab 1: Microscopy and the Metric System Purpose The purpose of this lab is to become familiar with the lighted microscope, how to prepare a wet mount, and understand taking measurements in the metric system and its conversions.  Materials & Methods Materials: Part A: * Computer for videos Part B: * Tape measure with centimeters * Scale that measures grams * Thermometer that shows Celsius * Campbell Biology Book

: Ab #1 Fundamentals Of Information Systems Security

661 words - 3 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Fundamentals of Information Security Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the

Information Systems Security Essay

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Lab1 Essay

786 words - 4 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and