This website uses cookies to ensure you have the best experience. Learn more

Nt2580 Lab 1 Essay

839 words - 4 pages

Lab #1 – Assessment Worksheet
Perform Reconnaissance & Probing Using ZenMap GUI (Nmap)
Course Name & Number:
Overview
Hackers traditionally follow a 5-step approach to seek out and destroy targeted hosts. The first step in
performing an attack is to plan the attack by identifying your target and learning as much as possible
about the target. Hackers traditionally perform an initial reconnaissance & probing scan to identify IP
hosts, open ports, and services enabled on servers and workstations. In this lab, students will plan an
attack on 172.30.0.0/24 where the VM server farm resides. Using ZenMap GUI, students will then
perform a “Ping Scan” or “Quick Scan” on the ...view middle of the document...

If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields
in the ICMP echo-request / echo-replies vary?
At least one: TTL (Time to Live).
Windows Servers have a TTL of 128 and Ubuntu Linux Servers use a TTL of 64.
5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of
172.30.0.0/24?
nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24
6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under
what circumstances you would choose to run those particular scans.
a. Intense Scan – A thorough scan of all “well-known” TCP ports and Services identifying “wellknown”
services such as FTP, HTTP, etc…
b. Intense Scan plus UDP – Same as Intense Scan but scans the “well-known” port numbers using
the UDP protocol as well as TCP, which detects services such as tftp, DNS, etc…
c. Intense Scan All TCP Ports – This scan will detect all running TCP services on all available ports
0-65535, this is chosen when you want the scan to detect running services on high ports
d. Ping Scan – A very quick scan that is designed to simply ping all addresses on a given network
identifying which hosts are alive and responding to pings
e. Slow Comprehensive Scan – A thorough scan that is designed to bypass IDS systems and not set
off any alarms due to how slow it scans, more time-consuming but much more stealthy
7....

Other Papers Like Nt2580 Lab 1

Hate Crime Laws Essay

2348 words - 10 pages facial bones broke and he fell backward onto the pavement, cracking his skull and dislocating his brain from the brain stem. Kennedy was taken off life support later that day. Moller was initially charged with his death, but the charges were reduced to manslaughter without the hate crime attachment, and he was sentenced to only 5 years. With good behavior and other benefits, Moller served a little over 1 year for the death of Sean Kennedy (Algren

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages -Behavior Therapy, 26(2), 63-88. Ellis, A. (2000). Can rational emotive behavior therapy (REBT) be effectively used with people who have devout beliefs in God and religion. Professional Psychology: Research and Practice, 31 (1), 29-33. Jones, S.L., & Butman, R.E. (1991). Modern psychotherapies: A comprehensive Christian appraisal. Downers Grove, IL: InterVarsity Press. Lega, L.I., & Ellis, A. (2001). Rational emotional behavior therapy (REBT) in

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages to treat the disease. The people they decided to "experiment" on were a part of a very vulnerable population. These individuals were in need of medical care for their disease, a part of an ethnic minority, and (most) lacked the necessary education to understand what the researchers were telling them. The patients were presented with incentives such as burial insurance, free medical exams, and free meals (Klein 1). This seemed like a good offer

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages be productive, because if caught shirking the loss is high – they will not be able to find another job that pays such a high wage. Additionally, efficiency wages lead to competition among workers (and job seekers), not only those who were already in the job market, but also new incumbents attracted by the higher returns to work. This is illustrated in figure 1 below as an outward shift in the labour supply curve, and is empirically consistent

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages A Historical Analysis of the Economical Breakthroughs of the Industrial Revolution During the Industrial Revolution, many elements of society experienced huge breakthroughs that would change the way they functioned forever. Economics were definitely one of them. With many new inventions and many factories appearing, many, many, more resources were being created than ever before. Also, all of the revenue from these resources was being given to

Leadership Portrayed in Monologue from Shakespeare’s Henry V

1214 words - 5 pages Bennis, Warren G. 2004 "The Seven Ages of the Leader" Harvard Business Review. Vol. 82. Issue 1. January. 46-53. Badaracco, Joseph L. Jr. 2006"Leadership in Literature. A Conversation with Business Ethicist Joseph L. Badaracco Jr." Harvard Business Review. Vol. 84. Issue 3. January. 47-55. Carter,S and Greer,C. 2013. Strategic Leadership: Values, Styles, and Organizational Performance. Journal of Leadership &Organizational Studies. 20 (4), 375

Cuba Civil Rights

1906 words - 8 pages Picture a country that has limits on how much you can make random government imprisonments and more what do you do. That is the situation for the eleven million seventy-five thousand two hundred forty-four people of Cuba since the takeover of Fidel Castro. The US is opposed to Castro taking control of Cuba. Castro managed to ease the United States nerves when he said that Cuba was against all forms of communism. According to Lana Wylie the Union

US Freight System

1273 words - 6 pages facilities, the grassroots program allows ATA members the opportunity to promote a pro-trucking environment directly to your elected officials.” 1 This is only one of the several services these type of organizations offer to their members, members who are willing to pay for a membership for many other benefits different than the one in the previous example at first. The current strategy of NITL competitors is to diversify their services, and to

Related Essays

Nt2580 Lab 1 Nt2580 Lab 1 Lab #1 Assessment Worksheet

599 words - 3 pages A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components: Computer systems (nodes or hosts). Network devices that enable connectivity (such as hubs, switches, and routers). The transmission medium provides a path for electrical signals between devices. Network interfaces are devices that send and receive electrical signals

Itt 255 Lab 6 Essay

3922 words - 16 pages ITT Technical Institute NT2580 Introduction to Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the

Nt2580 Unit 1 Essay

3775 words - 16 pages NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform

Freedom And Responsibility Essay

2141 words - 9 pages very next day, tables were placed in front of the Administration building. On October 1, Jack Weinberg, who was running the CORE (Congress on Racial Equality) table, was arrested by campus police after he refused to state his name and hand over his student card. As they brought a car to the plaza to take the limp Jack Weinberg, the students spontaneously surrounded the cop car and deflated the tires to keep the car from leaving campus. For 32 hours