Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Http nmap org download html

26/10/2021 Client: muhammad11 Deadline: 2 Day

CYB 610

Project 3 Workspace Exercise

I. Network Analysis Lab (Nmap and Wireshark)

a. Assignment Rules:

● Each student has to do the lab individually. No content directly quoted from Internet or

other sources is allowed

● Include your results in your deliverables

b. Assignment Objectives:

 Use vulnerability tools to analyze Windows and Linux OS in a networked environment.

 Use manuals and general guidance to generate vulnerability report.  Identify open ports, blank passwords, and other vulnerabilities of the IT system.

 Based on the automatic generated reports, write a Security Assessment Report (SAR) and Risk Assessment Report (RAR).

c. Competencies: vulnerability assessments

d. Lab Overview: As you perform this lab, you will reinforce the concepts learned in the steps of your ELM classroom. The purpose of this lab is to have hands-on experience running vulnerability tools that help you detect potential weaknesses in your system. In Project 2 you used MBSA and OpenVAS. During this lab you will use Nmap and Wireshark. You should have already learned the functionality of these tools as you studied the content of Project 3 steps in your ELM classroom.

You will use the UMUC Virtual lab environment to access the vulnerability assessment tools you need for this lab (i.e. Nmap and Wireshark). These tools are already installed in the UMUC Virtual Lab VMs.

The virtual lab environment that UMUC provides, has 4 VMs (Virtual Machines) connected as depicted in the figure below. Two of the machines run Linux OS, and two run Windows OS as follows:

VM1= Linux = NIXATK01

VM2= Linux = NIXTGT01 (Use this VM for Nmap – target system)

VM3= Windows = WINATK01 (Use this VM to run Wireshark and

Nmap)

VM4= Windows = WINTGT01 (Use this for VM for Nmap – target

system)

2

e. Lab Instructions: Perform the following steps:

1) Familiarize yourself with the resources provided in the Lab Resources section of this

document. You will find helpful open source links that help you understand the tools

you will use in this lab.

2) Connect to the lab environment following the connect instructions provided in your

classroom (let your instructor know if you cannot locate the connect instructions).

Contact lab support if you need general technical support related to your virtual lab

environment and associated lab exercises. After you have successfully connected to

the lab environment, proceed to next step in order to run the tools associated with this

project.

3) Run Wireshark.

 Follow the instructions provided in the Wireshark section I of Appendix A .

 Review the open source links for Wireshark available in the Lab Resources in

order to understand this tool and interpret its results.

4) Run Nmap.

 Follow the instructions provided in the Nmap section II of Appendix A.

 Review the open source links for Nmap available in the Lab Resources in

order to understand this tool and interpret its results.

5) Compile your findings and incorporate it in your deliverables for this project.

3

II. Lab Resources

Lab Credentials:

User: StudentFirst

Pass: Cyb3rl@b

Application websites

● Wireshark

o https://www.wireshark.org/download.html ● NMAP

o http://www.insecure.org/nmap.

Application documentation

● Wireshark o http://www.eecs.yorku.ca/course_archive/2011-12/F/3213/Project/guide.pdf

o https://www.wireshark.org/download/docs/user-guide-a4.pdf o https://www.wireshark.org/download/docs/user-guide-us.pdf

● NMAP o https://nmap.org/book/man.html o https://nmap.org/bennieston-tutorial/

Application videos online

● Wireshark o https://www.youtube.com/watch?v=0bazkLeY6b4

o https://www.youtube.com/watch?v=Lu05owzpSb8

● NMAP o https://www.youtube.com/watch?v=RJxF7puQFXI

o https://www.youtube.com/watch?v=USbDwxkEfI8

APPENDIX A

Return to Lab Instructions

I. Wireshark

What is Wireshark? Wireshark is a free and open-source packet analyzer. It is used for network

troubleshooting, analysis, software and communications protocol development, and education.

http://www.wireshark.org/download.html
http://www.insecure.org/nmap
http://www.eecs.yorku.ca/course_archive/2011-12/F/3213/Project/guide.pdf
http://www.wireshark.org/download/docs/user-guide-a4.pdf
https://www.wireshark.org/download/docs/user-guide-us.pdf
http://www.youtube.com/watch?v=0bazkLeY6b4
http://www.youtube.com/watch?v=Lu05owzpSb8
http://www.youtube.com/watch?v=RJxF7puQFXI
http://www.youtube.com/watch?v=USbDwxkEfI8
4

For this lab, use the Wireshark installed in WINATK01 Windows VM. Familiarize yourself with

the open source links for Wireshark provided in the Lab Resources in order to learn more about

this tool.

Contact CLAB699 Lab Assistance if you experience problems accessing this tool.

Overview: For this lab, you will analyze 5 Wireshark files (provided to you). Download these files

from the desktop of WINATK01Lab Resources, locate the PCAP files and place them in a

location within WINATK01 where you can find them (Wireshark files have the extension name of

.pcap). The 5 files you are going to analyze are:

1. mysql_complete.pcap 2. HTTP.pcap 3. ospf simple password authentication.pcap 4. telnet.pcap

5. gmail.pcapng.pcap

As you analyze the results of each file, consider the following questions:

 what are the unique pair of IP addresses that are communicating with one another, based on their being noted in the Source and Destination addresses in the top frame of Wireshark's data display?

 For each unique pair of IP addresses communicating, what protocol(s) does Wireshark indicate that they are using?

 What port numbers are indicated as being used for the source and destination, when you click on a packet line in the top frame and open the Transmission Control Protocol in the middle frame? Identify the port numbers (Src Port and Dst Port) for each unique pair of IP addresses communicating for each unique protocol they are using (like TCP or HTTP, and so forth).

5

 What are the MAC Addresses for each of the unique pair of machines that are communicating with one another? (HINT: this can be see in the middle frame on the line that is for the Ethernet II layer, and a MAC address is indicated as six double digit numbers separated by colons).

 What plaintext information (if any) can you find in any of the packets in the upper frame of Wireshark, when you select the bottom most OSI layer in the bottom row in the middle frame, when you look at the hexidecimal and ASCII interpretation of the data in the packet in the lower frame of the window?

 Refer to Wireshark user’s guide as needed. https://www.wireshark.org/download/docs/user-

guide-us.pdf

Step by Step Instructions:

1. On the desktop of the VM WINATK01  Lab Resource  Applications  locate and

launch Wireshark.

2. Double Click on the ‘Local Area Connection’ to start Wireshark. It will automatically start capturing.

https://www.wireshark.org/download/docs/user-guide-us.pdf
https://www.wireshark.org/download/docs/user-guide-us.pdf
6

3. Since you are going to analyze Wireshark files that have already been captured, you need to

stop this initial capture. Stop running the current capture by clicking on the red square upper left hand corner. Proceed to step 4 to load the first pcap file.

7

4. Load the first captured pcap file provided to you (as explained in the Overview).

5. Analyze the output of the file considering the questions provided in the Overview.

6. Repeat steps 4 and 5 until you have analyzed the 5 files provided.

7. Make note of your findings.

8

II. Nmap (The Network MAPper) (Return to Lab Instructions)

What is Nmap? The Network MAPper is a security scanner that is used to discover hosts and

services on a computer network. Based on network conditions, it sends out packets with specific

information to the target host device and then evaluates the responses. Thus, it creates a

graphical network map illustration.

To crack into a computer system, an attacker must target a machine and identify which ports the

machine is listening at before a system can be compromised. The attacker can sweep networks

and locate vulnerable targets using scanners such as Nmap. Once these targets are identified

with scanners such as Nmap, the attacker may scan for listening ports. Nmap also uses TCP stack

fingerprinting to accurately determine the type of system being scanned.

Familiarize yourself with the open source links for Nmap provided in the Lab Resources as you

will learn more about the functionality of this tool. Contact CLAB699 Lab Assistance if you

experience problems accessing this tool.

After the lab exercises, you should be able to use Nmap to scan a host/network to identify

possible vulnerable locations in the host/network.

During this exercise, you will use a windows system to scan other systems in the UMUC virtual

lab network. Specifically, you will use the Windows VM WINATCK01 system to scan two

other systems: VM WINTGT01 (windows) and VM NIXTGT01 (Linux).

In addition to command line, there are a few graphical front ends; our lab exercise will focus on

using Nmap from the Zenmap graphical front end installed in the WINATK01 windows VM of

the UMUC virtual lab.

Step by Step Instructions: 8. On the desktop of the VM WINATK01  Lab Resource  Applications  locate and

launch the Zenmap graphical interface

9

9. PORT Scanning on WINTGT01 (nmap –Pn WINTGT01)

Scan for open ports on the Windows target VM WINTGT01 using the command (nmap -Pn) as

shown in the command field of the interface. In the Zenmap “Target” field, you will type the

name of the target host: WINTGT01. You will see this entry appear in the “Command” field.

You can modify the command as appropriate, to try out different scans by using the 'scan'

button. You can cancel a scan by clicking the cancel button.

10. Repeat step 2 to do port scanning for the second target system NIXTGT01

11. Study and understand the output obtained.

10

12. Operating System Fingerprinting

Perform this test using the command: nmap –sS –v –O WINTGT01 and study the results

13. Repeat step 5 to perform the test for the second target system NIXTGT01

14. Make note of your findings.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Assignment Hub
Homework Guru
Solution Provider
Top Quality Assignments
Academic Mentor
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$27 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$36 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$49 Chat With Writer
Solution Provider

ONLINE

Solution Provider

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$33 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$43 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Diabetes cycle of care mbs - Dubois laurent czellar 2001 - The psychology of reading - Bsbpmg522a undertake project work assessment answers - How to prepare retained earnings statement - Occupational health and safety risk register - Project 3 - Cpo focus on physical science answer key - John berger ways of seeing mystification - Transaction exposure and translation exposure - Jones & bartlett learning llc - Top bar hive pros and cons - Total maintenance cost formula - Clark rubber rubber strips - Blood brothers edward key quotes - Jaycar bluetooth receiver car - Ermogenous v greek orthodox community of sa - Johnson and johnson case study - All my own work - What is tweening in multimedia - Effie company uses a periodic inventory system - A report on an event. News story, blog, due this saturday - Organizational Flexibility - Biopsychology - Project management conveyor belt project - Central garage doors milnthorpe - Spotlight retail group abn - Is there a difference between academic and professional writing - A 2 page rite in double spacing and use paragraphs, Times Roman, 12 font, indent paragraphs. Include resource to support your points and ideas. Include a reference page with correct APA format if references used in the summary. - Ruddigore act 1 finale - Bbc bitesize national grid - 2.1 prepare income statement for may - Discussion week 10 - Salmon rocks cape conran - Taxation office perth contact number - Worker cob csu chico - Target brand proactiv - 13343 sydney rd valrico fl 33594 - Grade 12 chemistry practice exam - Finance questions - Under armour swot analysis 2016 - MBA 560 - ESSAY ASSIGNMENT - Stages in ethical decision making - Igcse biology end of chapter answers chapter 13 - Margaret o'donnell blackrock clinic - A victorian hangman tells his love - Hacking - Wife maintenance law in pakistan - How to calculate evpi from decision tree - Variation of fermi level with temperature in intrinsic semiconductor - PAPER - Dynamics crm implementation plan - 3538 pear blossom circle oceanside ca - Rosetta stone ipo price - 125 witty road moggill - Eleven sandra cisneros text - EH week9 P9 - A slumber did my spirit seal - Discussion: Identify Researchable Problems - Todd harbaugh age - Ana scope and standards of practice - Racism birth control and reproductive rights angela davis - Bonallack and bishop jobs - Use case diagram for library management system with explanation - Reign of error diane ravitch pdf - Capstone chap1 - Thomas boughey high school - Pollak 192 3 cross reference - Mcgraw hill connect answer key economics - Alistair bryce clegg training - Discussion about MAC< DAC and RBAC - Artists society of canberra - Which of the following statements is true of process costing? - Differentiating between market structures powerpoint - Which of the following is not a function of money - The use of absorption costing can result in misleading product cost information. - Business partnership proposal pdf - Math ai hl formula booklet - Construction of unit hydrograph - Nurs 561 week 1 - Lou jordan elvis to the stars - Suss student handbook - Reflective Paper - Why are protists hard to classify - Testout security pro certification exam answers - Concordia college jobs bronxville - Van ijzendoorn and kroonenberg - Ebay trading api wsdl - The norton introduction to philosophy 2nd edition - Tibolone banned in usa - Camera techniques in film - Discussion of melting point experiment - Stop stigma survey - Toyota fleet management novated - Hong kong water department - TOP BEST DEAL!!!!HAGER WERKEN +27839281381 EMBALMING COMPOUND POWDER - Gomez runs a small pottery firm - Anz eftpos rolls order online - Yo yo ma necessary edges summary - Supermarket/Grocery Industry Economics Assignment