Lab2_Recon_Network_Scanning
.docx
keyboard_arrow_up
School
University of Rochester *
*We aren’t endorsed by this school
Course
3710
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by SargentFlagKomodoDragon15
CS 3710 Introduction to Cybersecurity
Term: Spring 2024
Lab Exercise 2 – Reconnaissance
and Network Scanning Lab
Due Date: February 2, 2024 11:59pm
Points Possible: 7 points
Name: Ziqian Zhao
By submitting this assignment you are digitally signing the honor code, “On my honor, I pledge that I have neither given nor received help on this assignment.”
Generative AI assistance is NOT permitted on this assignment.
1. Overview
This lab exercise will provide some hands-on experience with reconnaissance, network scanning, and service enumeration. 2. Resources required
This exercise requires a Kali Linux VM running in the Virginia Cyber Range.
3. Initial Setup
From your Virginia Cyber Range course, select the Cyber Basics
environment. Click “start” to start your environment and “join” to get to your Linux desktop login.
4. Tasks
Task 1: Whois lookups
For this portion of the exercise, you can use a web browser on your laptop or desktop computer, or you can log in to your Cyber Basics environment in the Virginia Cyber Range. WHOIS
is a tool for querying databases containing domain registration data to determine ownership, IP addresses, and other information. A reverse whois lookup can be used to find domains that are registered by a particular individual or organization. ICANN is the authoritative source for WHOIS information, however due to the General Data Protection Regulation (GDPR) a lot of its information is now restricted. Other sources of WHOIS information include https://pk.godaddy.com/whois
, and https://whois.domaintools.com/
.
Question #1: Do a whois lookup on the domain jmu.edu
. To whom is the domain registered? What is the administrative contact name, address, email, and phone number? (.5 point)
The domain jmu.edu is registered to James Madison University.
The administrative contact name is Dennis Little, with address as Massanutten Hall 265, MSC 5733, Harrisonburg, VA 22807, USA. Phone number is +1.5405681676. Email is littledr@jmu.edu
© 2024 Virginia Cyber Range. Created by David Raymond, Ph.D., CISSP, Virginia Tech. (CC BY-NC-SA 4.0)
Modified by Angela Orebaugh, Ph.D, CISSP, University of Virginia
CS 3710 Introduction to Cybersecurity
Term: Spring 2024
Task 2: nslookup and dig
Nslookup is a Linux and Windows tool for querying the distributed database that makes up the domain name system (DNS). This database translates host names (such as www.virginiacyberrange.org) to IP addresses (52.85.151.5). This translation is necessary because your computer must have the IP address of systems, such as web servers, that it communicates with, but humans are not good at remembering strings of numbers so we remember hostnames instead. DNS converts hostnames to the proper IP address so your web browser can find that web page. This DNS lookup usually happens in the background so users don’t realize it is happening. You can use the nslookup tool to do this mapping from
the command line.
For this exercise, you will log in to your Virginia Cyber Range account and select the Cyber Basics environment, then click “start” to start your environment and “join” to get to your Linux desktop login. Question #2: Use nslookup
to find the IP address for vt.edu. What is the IPv4 address? Provide a screen shot and explain where you found the answer. (.5 point)
The IPv4 address is 198.82.215.14.
Dig
is another, and generally more powerful, tool for DNS database queries. However, dig is only available on Linux and Unix systems. Question #3: Examine the Linux ‘man page’ for the dig utility to find more information about dig. What does the ‘
-x
’ command-line option do in dig? (.5 point)
The -x command-line option in dig is used for doing reverse DNS lookups. Instead of directly providing the hostname to get the IP address, we now provide the IP address to get the hostname associated with it.
Question #4: Use dig to conduct a reverse lookup of the IP address 134.126.20.33. What is the hostname or hostnames correspond with that IP address? (.5 point)
The corresponding hostname is cs.jmu.edu.
© 2024 Virginia Cyber Range. Created by David Raymond, Ph.D., CISSP, Virginia Tech. (CC BY-NC-SA 4.0)
Modified by Angela Orebaugh, Ph.D, CISSP, University of Virginia
CS 3710 Introduction to Cybersecurity
Term: Spring 2024
Task 3: Network scanning using nmap
Your Kali Linux virtual machine in the Virginia Cyber Range is connected to a small network subnet with other systems. Your first step in this exercise is to understand your network neighborhood.
Question #5: What is your IPv4 address and netmask? (.5 point)
The address is 10.1.86.39 and the netmask is 255.255.240.0
There are different ways to accomplish host discovery on a network. For this exercise we will use Nmap (https://nmap.org/book/man.html
), a widely used tool for network exploration and port scanning. Nmap can be used to scan a single hostname or IP address or range of addresses. You can learn more about Nmap through the man page (
man nmap
) or simply type nmap
with nothing else and hit enter to see a summary of command options and usage. To scan a single host you would use the following command:
$ nmap <options> <hostname or IP address>
Question #6: Run an nmap scan against your own IP address. What ports are open? Provide a screenshot and explain or show where you found your answer. (.5 point)
22/tcp(SSH) and 3389/tcp(). I found it in the line starting with “PORT”.
Ping scan
. Let’s see what other systems are on the network by using Nmap’s ping scan. Nmap has a ping
scan option that simply sends a ping packet to each IP address and listens for replies to identify active © 2024 Virginia Cyber Range. Created by David Raymond, Ph.D., CISSP, Virginia Tech. (CC BY-NC-SA 4.0)
Modified by Angela Orebaugh, Ph.D, CISSP, University of Virginia
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary.
You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos)
Your Task is:
To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2].
References:
[1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia.
[2] https://www.sans.org/information-security-policy/
arrow_forward
Rei computer program was published by distributed by her company without
her consent. This happened a year after Rei resigned from her position. Do
you think a cybercrime was committed? *
No, there wasn't what the company did was in their jurisdiction considering that Rei
was their former employee
Yes there was, Rei is a victim of social engineering since they published the program
without the distribution rights or even consent given by Rei
No, there wasn't since it is a computer program and copyright only applies to
materials that are literary
Yes there was, Rei was a victim of copy right infringement since the creative right of
the program is own by its developer or the programmer and without Rei consent what
the company did was unlawful
arrow_forward
This is Final Warning ⚠️ Don't post AI generated answer or plagiarised answer. If I see these things I'll give you multiple downvotes and will report immediately.
arrow_forward
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Match the attack vector with the identified attack
(see attched photo)
You can only choose one attack for each and once used you cannot re-use the attack.
arrow_forward
Your outline should include:
Project phishing
Topics of the review
Sub-topics
A division of labor (which
Project phishing: Outlines the objectives of your solution
Methodology: Discusses the techniques or processes used in
designing your solution
Results: Overview of the solution, how the solution addresses the identified problem, limitations of the solution, challenges, recommendations for success
arrow_forward
Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.
arrow_forward
Have you ever seen someone being bullied or harassed online by another person? What did you feel when you initially learned about the situation? How did you get to the conclusion that, prior to your intervention, the individual had been the target of bullying behavior?
arrow_forward
Question 43
Select the appropriate response
True or False: Most back injuries are due to improper removal and replacement of the ladder on the
company truck.
True
O False
Submit Response
arrow_forward
This week, we learned about oversharing and how it can help an attacker gain access to important user credentials. As you’ll see throughout the semester, sharing certain information online can potentially lead to a lot of problems later.
NOVA Labs put together an interesting story.A Cyber Privacy Parable (3:27)Links to an external site.Minimize VideoWatch the video and read the prompt above, and then respond to the following questions:
Why do you feel that people should (or should not) be concerned about oversharing?
What types of information do you share on your social media accounts?
Let’s say that you saw a friend post the following message to her Twitter account:
As someone familiar with cybersecurity, do you see anything wrong with this post?
After seeing this posted online, what would you say (if anything) to your friend?
Please make sure that all of your answers are numbered and in full sentences!
arrow_forward
Instructions: Each student shall provide his own answers to the following questions. Similarity in the
students' answers will be classified as CHEATING cases.
The Operations Security Process consists of the following steps:
Step 1: Identification of Critical Information
Step 2: Analysis of Threats
Step 3: Analysis of Vulnerabilities
Step 4: Assessment of Risks
Step 5: Application of Countermeasures
If you were the information security manager of University of Hafr AIBatin, and you were asked to apply
the five steps of Operations Security Process to the university. Explain how should you apply these steps
and what are your expected outcomes for each step?
arrow_forward
Explain the meaning of the word inappropriately in the phrase “one users work does not inappropriately influence another user's work."
arrow_forward
Why are limits on access still a thing in this day and age? Please include at least two instances of such restrictions in your response.
arrow_forward
Please explain a possible workplace scenario in no more than 300 words.
arrow_forward
How does GRANT affect safety? Are privileges restricted? How are they revoked?
arrow_forward
Nearly a decade has passed sinuce the
National Academy of Engineers declared
Cyber Security a "grand challenge for the
next century." Every day there is news on
ways in which cyber security challenges
and responses are complicating every
aspect of our lives. Can the challenge be
solved? (40marks)
As a first step to solving any problem, one
must understand its nature. So, it is
important for all cyber security analysts to
keep on top of news stories in the field. In
this discussion forum we will do just that
with the hope that everyone will make it a
daily habit throughout their career.
Today, some cyber news has been flooded
out of the headlines by Hurricane Harvey,
but as noted in this article, cyber concerns
are front and center as students return to
school.
arrow_forward
Alert dont submit AI generated answer.
arrow_forward
You've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files.
Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified:
Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigation
arrow_forward
Have you ever seen someone being bullied or harassed online by another person?
What did you think of the scenario at first? How did you determine that the victim of
bullying was already being mistreated before you intervened?
arrow_forward
g. Illicit Cryptomining Create a presentation to discuss a certain abuse assigned to you. The discussion/presentation must focus on the following: 1. Nature of the abuse (types, operation, tools, etc.) 2. Actual case/news 3. Causes of abuse (reasons for committing the crime) 4. Effect/damages 5. Ways to avoid
arrow_forward
Which of these statements is TRUE?
Question 9 options:
a)
b)
C)
d)
e)
ALL events MUST be logged
The requirements for defining something as an event are LOW
A specific incident would ONLY be associated to one event
An average organization would observe SLIGHTLY more events than incidents
ALL incidents are very serious and are worthy of a thorough investigation
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/arrow_forwardRei computer program was published by distributed by her company without her consent. This happened a year after Rei resigned from her position. Do you think a cybercrime was committed? * No, there wasn't what the company did was in their jurisdiction considering that Rei was their former employee Yes there was, Rei is a victim of social engineering since they published the program without the distribution rights or even consent given by Rei No, there wasn't since it is a computer program and copyright only applies to materials that are literary Yes there was, Rei was a victim of copy right infringement since the creative right of the program is own by its developer or the programmer and without Rei consent what the company did was unlawfularrow_forwardThis is Final Warning ⚠️ Don't post AI generated answer or plagiarised answer. If I see these things I'll give you multiple downvotes and will report immediately.arrow_forward
- "The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forwardMatch the attack vector with the identified attack (see attched photo) You can only choose one attack for each and once used you cannot re-use the attack.arrow_forwardYour outline should include: Project phishing Topics of the review Sub-topics A division of labor (which Project phishing: Outlines the objectives of your solution Methodology: Discusses the techniques or processes used in designing your solution Results: Overview of the solution, how the solution addresses the identified problem, limitations of the solution, challenges, recommendations for successarrow_forward
- Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.arrow_forwardHave you ever seen someone being bullied or harassed online by another person? What did you feel when you initially learned about the situation? How did you get to the conclusion that, prior to your intervention, the individual had been the target of bullying behavior?arrow_forwardQuestion 43 Select the appropriate response True or False: Most back injuries are due to improper removal and replacement of the ladder on the company truck. True O False Submit Responsearrow_forward
- This week, we learned about oversharing and how it can help an attacker gain access to important user credentials. As you’ll see throughout the semester, sharing certain information online can potentially lead to a lot of problems later. NOVA Labs put together an interesting story.A Cyber Privacy Parable (3:27)Links to an external site.Minimize VideoWatch the video and read the prompt above, and then respond to the following questions: Why do you feel that people should (or should not) be concerned about oversharing? What types of information do you share on your social media accounts? Let’s say that you saw a friend post the following message to her Twitter account: As someone familiar with cybersecurity, do you see anything wrong with this post? After seeing this posted online, what would you say (if anything) to your friend? Please make sure that all of your answers are numbered and in full sentences!arrow_forwardInstructions: Each student shall provide his own answers to the following questions. Similarity in the students' answers will be classified as CHEATING cases. The Operations Security Process consists of the following steps: Step 1: Identification of Critical Information Step 2: Analysis of Threats Step 3: Analysis of Vulnerabilities Step 4: Assessment of Risks Step 5: Application of Countermeasures If you were the information security manager of University of Hafr AIBatin, and you were asked to apply the five steps of Operations Security Process to the university. Explain how should you apply these steps and what are your expected outcomes for each step?arrow_forwardExplain the meaning of the word inappropriately in the phrase “one users work does not inappropriately influence another user's work."arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning