Thursday, May 14, 2020

LAB 1 NMAP Exercise Answers Essay example - 3200 Words

Nmap LAB EXERCISE CSEC 640 LAB-1 University of Maryland University College B-McDerm February 16, 2014 ASSIGNMENT PART A-NMAP 3.3 Lab Questions: Part A 1. What are the services that are running on each host? Some of the hosts include the following services below, but not all â€Å"3† include the same services. Domain: Host â€Å"3† only FTP: All Host’s HTTP: All Host’s Microsoft-DS: All Host’s Microsoft-RDP: All Host’s MSRPC: All Host’s MYSQL: All Host’s Netbios-SSN: All Host’s SSH: Host â€Å"3† only Talent: All Host’s The three diagrams below show the results from the OS Fingerprinting scan. Figure 1: Host 1 (192.168.100.103) Figure 2: Host 2 (192.168.100.105) Figure 3: Host 3†¦show more content†¦Host discovery is a great way to create and maintain an asset database and to discover rogue devices on the network. The real power attribute of Nmap is port scanning, and its efficiency in security auditing, asset management, and especially compliance. Port scanning gives the ability to locate systems with file sharing ports or unauthorized FTP servers and printers. Open ports disclose potential and probable security weaknesses, provide application and services inventory, and validate compliance with approved software guidelines (Orebaugh Pinkard, p.99, 2008). 5. Which feature(s) of Nmap did you find the most useful and why? The most useful and most operable feature of Nmap is â€Å"OS Fingerprinting†. This feature offers the most depth of results when running a scan of a host. OS Fingerprinting yields information regarding open ports, types of services, as well as the operating system running on the host. OS Fingerprinting is both passive and active, meaning, in the passive it involves sniffing network traffic at any given connection point and matching known patterns that match pre-existing OS identities. In the active this feature requires the use of a set of specialized probes that are sent to the system in question; the responses from the active give insight to what type of OS has been installed. With the availability of these different attributes to one feature gives the IT professional a full scope and clear picture of theShow MoreRelatedEthical Hacking2871 Words   |  12 PagesAnd now the present condition is: â€Å"HACK YOUR ORGANIZATION BEFORE THE BAD GUYS DO IT† HACKER AND HACKING: [pic] The term hacker has a dual usage in the computer industry today. Originally, the term was defined as 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.