Reconnaissance and Probing Using Zenmap

Summary
Hackers typically follow a five-step method to look for and destroy targeted hosts. The very first action in carrying out an attack is to plan the attack by determining the target and learning as much as possible about it. Hackers generally perform a preliminary reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this laboratory, you planned an attack on 172.30.0.0/ 24 where the VM server farm lives, and utilized the Zenmap GUI to carry out an "Intense Scan" on the targeted IP subnetwork.

Keep in mind:

These kinds have been formatted to permit you to finish the type online and wait utilizing Adobe Reader. You may experience issues with either or both of these actions if you are using any other software program.

Laboratory Assessment Questions & & Answers
1. Name at least 5 applications and tools pre-loaded on the TargetWindows01 server desktop, and identify

whether that application begins as a service on the system or should be run by hand.

Get quality help now
Writer Lyla
Writer Lyla
checked Verified writer

Proficient in: Computers

star star star star 5 (876)

“ Have been using her for a while and please believe when I tell you, she never fail. Thanks Writer Lyla you are indeed awesome ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

windows applicaTion filled
1. 2. 3. 4. 5.

begins as service Y/n
q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No

tftpd32 filezilla wireshark Nessus NetWitness Private investigator

16

Laboratory # 1|Perform Reconnaissance and Penetrating Utilizing Zenmap GUI (Nmap) 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,

LAN Change 2, and the IP default entrance router?
TagetWindows01 Server- Source IP = 172.30.0.8 TargetUbuntu01 Server-- Source IP = 172.30.0.4 TargetUbuntu02 Server-- Source IP = 172.30.0.9 The Default Gateway IP is = 172.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

30.0.1

3. Did the targeted IP hosts react to the ICMP echo-request package with an ICMP echo-reply packet when

you initiated the "ping" command at your DOS prompt? If yes, the number of ICMP echo-request packets were returned to the IP source? Yes, the targeted IP host responded back with 4 echo-replies.

4. What is the command line syntax for running an "Extreme Scan" with Zenmap on a target subnet of

172.30.0.0/ 24?
The fields that differ is the Time To Live (TTL) fields. For the TargetUbuntu01 it's 64 and the TargetWindows01 is 128.

5. Name at least five different scans that may be performed from the Zenmap GUI. Document under what

circumstances you would choose to run those particular scans. The syntax for an Intense Scan in Zenmap is as followed: nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24

Assessment Worksheet
6. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after

17

1
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)

reviewing the scan report.
ZenMap GUI (Nmap) Learning Objectives and Outcomes Upon completing this lab, students will be able to perform the following tasks: Obtain, access, and copy the Virtual Machines (server farm and workstations) needed for this course onto your removable hard drive Use VMware Player to enable and power-up the VMs (server farm and workstations)...

7. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report.

8. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) find on the

network?

9. Based on your Nmap scan results and initial reconnaissance and probing, what next steps would you

perform on the VSCL target machines?

xzhaedria tucker

Updated: Jul 06, 2022
Cite this page

Reconnaissance and Probing Using Zenmap. (2016, Mar 24). Retrieved from https://studymoose.com/reconnaissance-and-probing-using-zenmap-essay

Reconnaissance and Probing Using Zenmap essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment