ALICIA G
.pdf
keyboard_arrow_up
School
George Mason University *
*We aren’t endorsed by this school
Course
420
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
7
Uploaded by ProfCatMaster1062
MIS 420 Term: Fall 2022 © 2021 Virginia Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 1 Laboratory Exercise 2 –
Overview of Penetration Name: Alicia Garcia G01468985 Due Date: 08/29/2022 Points Possible: 1 1. Overview For this lesson students will review Nmap scanning techniques with an emphasis on a penetration methodology. 2. Resources required This exercise requires a Kali Linux VM running in the Cyber Range. 3. Initial Setup For this exercise, you will log in to your Cyber Range account and select the Kali Linux with Metasploitable (2020.09)
environment, then click “start” to start your environment and “join” to get to your Linux desktop.
4. Tasks Task 1: Nmap Scanning Review
For this course you should already be familiar with Nmap and the switches. This lesson will cover a quick review of the Nmap scanning methodology. Complete the following: 1.
The first step to an internal penetration test is to find live systems. We do not need to perform a port scan to find the host, b
ut we do need to scan the entire subnet. Remember that your IP address will be different than mine. Open a terminal and a
t the command prompt, complete the following: View the subnet
●
ip addr show Scan for live systems
MIS 420 Term: Fall 2022 © 2021 Virginia Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 2 ●
nmap -sn <IP/20> In my case: nmap -sn 10.1.143.6/20 In my case, four hosts were found
. You may have found more or less hosts than I did. For now, I want you to understand that finding live systems is the first step to an internal penetration test. 2.
The second step is to see what doors are open on these hosts. This will greatly narrow the amount of systems we enumerate, as many hosts will be filtered. Let’s scan for open ports. Either -sS
or -sT
will work. Using -
sS
is a half open scan and will prevent the scan from getting logged. Whereas sT
is a full connect and will be logged. In order to execute the nmap command with these options, you must be root. You can sudo <command>
or you can sudo su
to switch the user to root in that terminal. So, at the command prompt, type sudo su
to become root. Next, type the following: ●
nmap -T4 -sS <IP/20>
MIS 420 Term: Fall 2022 © 2021 Virginia Cyber Range. Created by R. Eric Kiser. (CC BY-NC-SA 4.0) 3 In picture below: ●
nmap -T4 -sS 10.1.143.6/20
There will be a lot of information printed to the screen. Scroll down until you find results that look like the screenshot below. There should only be one machine with several ports open (excluding your IP address). 3.
Now we need to find the service versions. At the command prompt, type the following: ●
nmap -T4 -sV <IP Address of Host> In my case: ●
nmap -T4 -sV 10.1.133.250
Your results should be similar to the screenshot below.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help