9

.docx

School

John Tyler Community College *

*We aren’t endorsed by this school

Course

262

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by MegaHareMaster1079

Report
Topology Objectives Part 1: Exploring Nmap Part 2: Scanning for Open Ports Background / Scenario Port scanning is usually part of a reconnaissance attack. There are a variety of port scanning methods that can be used. We will explore how to use the Nmap utility. Nmap is a powerful network utility that is used for network discovery and security auditing. Required Resources CyberOps Workstation virtual machine Internet access Instructions I have bolded and changed font to red for all sections that require a response. Type your response in this document and submit on Canvas when completed. Exploring Nmap In this part, you will use manual pages (or man pages for short) to learn more about Nmap. The man [ program |utility | function ] command displays the manual pages associated with the arguments. The manual pages are the reference manuals found on Unix and Linux OSs. These pages can include these sections: Name, Synopsis, Descriptions, Examples, and See Also. Start CyberOps Workstation VM. Open a terminal. At the terminal prompt, enter man nmap . [analyst@secOps ~]$ man nmap Questions: What is Nmap? Nmap is a network exploration tool and security Type your answers here. What is nmap used for? Nmap is used to scan a network and determine the available hosts and services offered in the network
Type your answers here. While in the man page, you can use the up and down arrow keys to scroll through the pages. You can also press the space bar to forward one page at a time. To search for a specific term or phrase use enter a forward slash (/) or question mark (?) followed by the term or phrase. The forward slash searches forward through the document, and the question mark searches backward through the document. The key n moves to the next match. Type /example and press ENTER. This will search for the word example forward through the man page. In the first instance of example, you see three matches. To move to the next match, press n . Look at Example 1. Question: What is the nmap command used? Nmap -A -T4 scanme.nmap.org Type your answers here. Use the search function to answer the following questions. Questions: What does the switch -A do? Enable OS detection, version detection, script scanning, and traceroute Type your answers here. What does the switch -T4 do? faster execution Type your answers here. Scroll through the page to learn more about nmap. Type q when finished. Scanning for Open Ports In this part, you will use the switches from the example in the Nmap man pages to scan your localhost, your local network, and a remote server at scanme.nmap.org.
Scan your localhost. If necessary, open a terminal on the VM. At the prompt, enter nmap -A -T4 localhost . Depending on your local network and devices, the scan will take anywhere from a few seconds to a few minutes. [analyst@secOps ~]$ nmap -A -T4 localhost Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-01 17:20 EDT Nmap scan report for localhost (127.0.0.1) Host is up (0.000056s latency). Other addresses for localhost (not scanned): ::1 rDNS record for 127.0.0.1: localhost.localdomain Not shown: 996 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.8 or later | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_-rw-r--r-- 1 0 0 0 Apr 19 15:23 ftp_test <some output omitted> Review the results and answer the following questions. Questions: Which ports and services are opened? 21/tcp: ftp, 22/tcp: ssh Type your answers here. For each of the open ports, record the software that is providing the services. ftp: vsftpd, ssh: OpenSSH Type your answers here. Scan your network. Warning: Before using Nmap on any network, please gain the permission of the network owners before proceeding. At the terminal command prompt, enter ip address to determine the IP address and subnet mask for this host. For this example, the IP address for this VM is 10.0.2.15 and the subnet mask is 255.255.255.0. [analyst@secOps ~]$ ip address <output omitted> 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 08:00:27:ed:af:2c brd ff:ff:ff:ff:ff:ff inet 10.0.2.15/24 brd 10.0.2.255 scope global dynamic enp0s3 valid_lft 85777sec preferred_lft 85777sec
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help