Updated Network mapping Lab Steps - Tagged
pdf
keyboard_arrow_up
School
The University of Tennessee, Knoxville *
*We aren’t endorsed by this school
Course
465
Subject
Industrial Engineering
Date
Dec 6, 2023
Type
Pages
9
Uploaded by GrandDonkeyPerson985
IST 451 - Network Security
Network Mapping
Introduction
Lab Topology
Exercise 1 - Scanning with Nmap
Exercise 2 - Document Findings
Review
Introduction
Welcome to the Network Mapping Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
Exercise 1 - Scanning with Nmap
Exercise 2 - Document Findings
After completing this lab, you will be able to:
Scan hosts on a network using nmap
Identify servers, workstations, and printers
Identify types of services by port numbers
Create a network diagram
Exam Objectives
The following exam objectives are covered in this lab:
Network scanning using nmap
Identifying well-known port numbers
Creating a network diagram
Note:
Our main focus is to cover the practical, hands-on aspects of the exam objectives. We recommend referring to course material or a search engine to research theoretical topics in more detail.
Lab Duration
It will take approximately 45 minutes to complete this lab.
Help and Support
For more information on using Practice Labs, please see our Help and Support page. You can also raise a technical support ticket from this page.
Click
Next
to view the Lab topology used in this module.
Lab Topology
During your session, you will have access to the following lab configuration.
Depending on the exercises, you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab.
PLABKALI - Kali Linux
PLABUBUNTU - Ubuntu Linux
Click
Next
to proceed to the first exercise.
Exercise 1 - Scanning with Nmap
In this lab you will perform scans of the network to identify active servers, workstations, and printers. This network is located on the 192.168.204.0/24 subnet. You can limit your scans to devices between 192.168.204.2-150. Any other devices are beyond the scope of this assignment.
Learning Outcomes
After completing this exercise, you will be able to:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Perform a network scan using CIDR notation
Scan for a specific port number
Scan a range of port numbers & devices
Your Devices
You will be using the following devices in this lab. Please power these on now.
Task 1 - Scan using CIDR notation
CIDR notation looks like this: 192.168.204.0/24
. It contains the IP address 192.168.204.0 and the /24 represents the number of leading 1 bits in the subnet mask. You may have seen this subnet represented as 255.255.255.0.
In binary, the subnet looks like this: 11111111 11111111 11111111 00000000. The leading 1 bits identify the network address, and the 0 bits represent the hosts. In this case the hosts can range from .1-.254 (because .0 and .255 are reserved).
Step 1
Power on the PLABUbuntu and PLABKali devices. On the PLABUbuntu machine, open a terminal and run the following command.
docker container list
You should see several containers listed. If the containers do not show up, then there was a problem with the lab.
Step 2
Switch to the PLABKali machine. Open a terminal and type the following command to scan the network using the CIDR notation for the network.
nmap 192.168.0.0/24
You should see a report that looks something like this.
Step 3
You can also scan the network for a specific port number. Type the following command to identify all web servers. The --open specifies that nmap should not report hosts that have port 80 closed.
nmap 192.168.0.2-150 -p 80 --open
Step 4
Finally use this command to scan for all ports between 1024-65535.
nmap 192.168.0.2-150 -p 1024-65535
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Step 5
On your own, use the examples above to identify all active hosts on the network and what services they are running. You will use this to answer questions in the following sections.
Exercise 2 - Document Findings
Learning Outcomes
After completing this exercise, you will be able to:
Identify servers, workstations, and printers from network scans
Identify types of services based on port number
Create a diagram of the network
Your Devices
You will be using the following devices in this lab. Please power these on now.
Task 1 - Write a Report
Use the scans you performed in the previous exercise to construct your report.
Submit
1.
A one paragraph (min) to one page (max) written BLUF-format document of your understanding of this network. Use good analytic writing style. Assume that you’re writing to a somewhat technically-
oriented boss or co-worker.
2.
A network diagram that expresses your understanding of this network. Submit the diagram flattened to a PDF or image file, or as a page of your document. You can use Microsoft Visio, draw.io, or another tool to create this diagram.
3.
A list of hosts that are found in the network. For each host identify what type of system it is (server, workstation, etc). Explain the purpose of the device and what services are running on it (FTP server, remote desktop, etc).
4.
A list of port numbers that each of these hosts offers services from.
5.
Any Indicators of Compromise (IOCs) that you might identify, or that you think are potentially suspicious. Include services that are known to be outdated/insecure.
Keep all devices that you have powered on in their current state and proceed to the review section.
Review
Well done, you have completed the Network Mapping Practice Lab.
Summary
In this module, you will complete the following exercises:
Exercise 1 - Scanning with Nmap
Exercise 2 - Document Findings
After completing this lab, you will be able to:
Scan hosts on a network using nmap
Identify servers, workstations, and printers
Identify types of services by port numbers
Create a network diagram
Feedback
Shutdown all virtual machines used in this lab. Alternatively, you can log
out of the lab platform.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help