9
.docx
keyboard_arrow_up
School
John Tyler Community College *
*We aren’t endorsed by this school
Course
262
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
7
Uploaded by MegaHareMaster1079
•
Topology
•
Objectives
Part 1: Exploring Nmap
Part 2: Scanning for Open Ports
•
Background / Scenario
Port scanning is usually part of a reconnaissance attack. There are a variety of port scanning methods that can be used. We will explore how to use the Nmap utility. Nmap is a powerful network utility that is used for network discovery and security auditing.
•
Required Resources
•
CyberOps Workstation virtual machine
•
Internet access
•
Instructions
I have bolded and changed font to red for all sections that require a response. Type your response in this document and submit on Canvas when completed. •
Exploring Nmap
In this part, you will use manual pages (or man pages for short) to learn more about Nmap. The man [
program |utility | function
]
command displays the manual pages associated with the arguments. The manual pages are the reference manuals found on Unix and Linux OSs. These pages can include these sections: Name, Synopsis, Descriptions, Examples, and See Also.
•
Start CyberOps Workstation VM.
•
Open a terminal.
•
At the terminal prompt, enter man nmap
.
[analyst@secOps ~]$ man nmap
Questions:
What is Nmap?
Nmap is a network exploration tool and security
Type your answers here.
What is nmap used for?
Nmap is used to scan a network and determine the available hosts and services offered in the network
Type your answers here.
•
While in the man page, you can use the up and down arrow keys to scroll through the pages. You can also press the space bar to forward one page at a time.
To search for a specific term or phrase use enter a forward slash (/) or question mark (?) followed by the term or phrase. The forward slash searches forward through the document, and the question mark searches backward through the document. The key n moves to the next match.
Type /example and press ENTER. This will search for the word example forward through the man page.
•
In the first instance of example, you see three matches. To move to the next match, press n
.
Look at Example 1.
Question:
What is the nmap command used?
Nmap -A -T4 scanme.nmap.org
Type your answers here.
Use the search function to answer the following questions.
Questions:
What does the switch -A do?
Enable OS detection, version detection, script scanning, and traceroute
Type your answers here.
What does the switch -T4 do?
faster execution
Type your answers here.
•
Scroll through the page to learn more about nmap. Type q
when finished.
•
Scanning for Open Ports
In this part, you will use the switches from the example in the Nmap man pages to scan your localhost, your local network, and a remote server at scanme.nmap.org.
•
Scan your localhost.
•
If necessary, open a terminal on the VM. At the prompt, enter nmap -A -T4 localhost
. Depending on your local network and devices, the scan will take anywhere from a few seconds to a few minutes.
[analyst@secOps ~]$ nmap -A -T4 localhost
Starting Nmap 7.40 ( https://nmap.org
) at 2017-05-01 17:20 EDT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000056s latency).
Other addresses for localhost (not scanned): ::1
rDNS record for 127.0.0.1: localhost.localdomain
Not shown: 996 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 2.0.8 or later
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_-rw-r--r-- 1 0 0 0 Apr 19 15:23 ftp_test
<some output omitted>
•
Review the results and answer the following questions.
Questions:
Which ports and services are opened?
21/tcp: ftp, 22/tcp: ssh
Type your answers here.
For each of the open ports, record the software that is providing the services.
ftp: vsftpd, ssh: OpenSSH
Type your answers here.
•
Scan your network.
Warning: Before using Nmap on any network, please gain the permission of the network owners before proceeding.
•
At the terminal command prompt, enter ip address to determine the IP address and subnet mask for this host. For this example, the IP address for this VM is 10.0.2.15 and the subnet mask is 255.255.255.0.
[analyst@secOps ~]$ ip address
<output omitted>
2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether 08:00:27:ed:af:2c brd ff:ff:ff:ff:ff:ff
inet 10.0.2.15/24 brd 10.0.2.255 scope global dynamic enp0s3
valid_lft 85777sec preferred_lft 85777sec
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
More modern firewalls that can perform tasks such as deep packet inspection.
arrow_forward
What are the primary functions of a firewall?I'm now working on packet filtering software. What rules have been set in place for me to follow?
arrow_forward
Review Open Source Firewall Products
and write a report(3-4 Pages Each) about
the below tools and Upload.
Review Means: Find Advantage,
Disadvantage, Uses, How its Working,
ACL Implementation, etc
Pfsense
SNORT
arrow_forward
What is the primary purpose of a firewall?I'm developing software for packet filtering. What are the ground rules that I am required to follow?
arrow_forward
A Network Security Design is necessary for a corporation to effectively protect its servers, since most of its operations are performed by servers on a flat network. A demilitarised zone is an option that has not been ruled out. If you could redesign the network from the ground up, what would you change?
arrow_forward
Given have a firewall between the Internet (represented by a cloud) and your network router. And some active attacks are added from the list of active attacks; os exploits, viruses, trojans, etc. Please refer to the diagram attached.
Are these attacks able to get to your network? Do you feel your system is secure? What’s wrong with this scenario?
arrow_forward
Can someone help me with this problem? It's a networking problem.
Thank you!
arrow_forward
What is the most essential function that a firewall is supposed to fulfill?At the moment, I'm working on designing some software to filter packets. Where can I get a list of the house rules that I am expected to abide by?
arrow_forward
Construct a firewall setup.
arrow_forward
What is a firewall's primary function?I'm currently working on a packet-filtering program. Can you provide me with a set of guidelines to follow?
arrow_forward
What is a firewall's primary purpose?I'm developing software for packet filtering. What are the ground rules I have to follow?
arrow_forward
Modern firewalls that can conduct functions such as deep packet inspection are becoming more common.
arrow_forward
Computer Science
Topic: Remote code execution vulnerability in HSMX internet gateway
IN YOUR OWN WORDS, please provide attacks that this vulnerability were exploited, then identify different components such as actor, subject, tools, etc., and how each took part or might have taken part in the given attack. I have already read what is already written up. I am looking for an answer from a different point of view/perspective.
arrow_forward
Describe the role of a firewall in network security and how it can be implemented at different OSI model layers.
arrow_forward
What is the primary purpose of a firewall?
On packet filtering software, I'm working. What are the guidelines I need to follow?
arrow_forward
Perform a comprehensive wi-fi wps attack with the reaver tool. Explain the attack commands in detail. Please share the command outputs as well.
#CyberSecurity
#Reaver
#wps
arrow_forward
Describe the role of firewalls in network security and their interaction with OSI model layers.
arrow_forward
Internet security systems are becoming increasing important since the threats to internet security
are becoming ever more sophisticated. One major technique which you have been introduced briefly
in T215B module is to improve the internet security through using a firewall. Using the internet and
other resources (e.g., books and AOU e-library), write an overview about Firewall which will include
the following items:
a. Describe the major kinds of firewall?
arrow_forward
Given have a firewall between the Internet (represented by a cloud) and your network router. And some active attacks are added from the list of active attacks; os exploits, viruses, trojans, etc. Please refer to the diagram attached.
Are these attacks able to get to your network? Do you feel your system is secure? What’s wrong with this scenario?
please don't copy the solution on Bartleby. it does not answer the question
arrow_forward
Computer Science
Find pen-testing technical mistakes in this scenario?
Company XYZ recently conduct a security audit by the internal auditor, after finishing the security audit, the company decided to use one of its staff to test an external pen testing and the company provided him all information regarding their network vulnerabilities, He chose Black box testing methodology but the company has a very tight budget and also allowing very short time to run the test. IT staff decided to start pen-testing at the very early stage without the company’s permission and shut all unused ports in the company. After that, he decided to test an application tester in the live network to find all vulnerabilities. He used dynamic testing to monitor system memory.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- More modern firewalls that can perform tasks such as deep packet inspection.arrow_forwardWhat are the primary functions of a firewall?I'm now working on packet filtering software. What rules have been set in place for me to follow?arrow_forwardReview Open Source Firewall Products and write a report(3-4 Pages Each) about the below tools and Upload. Review Means: Find Advantage, Disadvantage, Uses, How its Working, ACL Implementation, etc Pfsense SNORTarrow_forward
- What is the primary purpose of a firewall?I'm developing software for packet filtering. What are the ground rules that I am required to follow?arrow_forwardA Network Security Design is necessary for a corporation to effectively protect its servers, since most of its operations are performed by servers on a flat network. A demilitarised zone is an option that has not been ruled out. If you could redesign the network from the ground up, what would you change?arrow_forwardGiven have a firewall between the Internet (represented by a cloud) and your network router. And some active attacks are added from the list of active attacks; os exploits, viruses, trojans, etc. Please refer to the diagram attached. Are these attacks able to get to your network? Do you feel your system is secure? What’s wrong with this scenario?arrow_forward
- Can someone help me with this problem? It's a networking problem. Thank you!arrow_forwardWhat is the most essential function that a firewall is supposed to fulfill?At the moment, I'm working on designing some software to filter packets. Where can I get a list of the house rules that I am expected to abide by?arrow_forwardConstruct a firewall setup.arrow_forward
- What is a firewall's primary function?I'm currently working on a packet-filtering program. Can you provide me with a set of guidelines to follow?arrow_forwardWhat is a firewall's primary purpose?I'm developing software for packet filtering. What are the ground rules I have to follow?arrow_forwardModern firewalls that can conduct functions such as deep packet inspection are becoming more common.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning