Updated Network mapping Lab Steps - Tagged

pdf

School

The University of Tennessee, Knoxville *

*We aren’t endorsed by this school

Course

465

Subject

Industrial Engineering

Date

Dec 6, 2023

Type

pdf

Pages

9

Uploaded by GrandDonkeyPerson985

Report
IST 451 - Network Security Network Mapping Introduction Lab Topology Exercise 1 - Scanning with Nmap Exercise 2 - Document Findings Review Introduction Welcome to the Network Mapping Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills. Learning Outcomes In this module, you will complete the following exercises: Exercise 1 - Scanning with Nmap Exercise 2 - Document Findings After completing this lab, you will be able to: Scan hosts on a network using nmap Identify servers, workstations, and printers Identify types of services by port numbers Create a network diagram Exam Objectives The following exam objectives are covered in this lab: Network scanning using nmap Identifying well-known port numbers Creating a network diagram
Note: Our main focus is to cover the practical, hands-on aspects of the exam objectives. We recommend referring to course material or a search engine to research theoretical topics in more detail. Lab Duration It will take approximately 45 minutes to complete this lab. Help and Support For more information on using Practice Labs, please see our Help and Support page. You can also raise a technical support ticket from this page. Click Next to view the Lab topology used in this module. Lab Topology During your session, you will have access to the following lab configuration.
Depending on the exercises, you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab. PLABKALI - Kali Linux PLABUBUNTU - Ubuntu Linux Click Next to proceed to the first exercise. Exercise 1 - Scanning with Nmap In this lab you will perform scans of the network to identify active servers, workstations, and printers. This network is located on the 192.168.204.0/24 subnet. You can limit your scans to devices between 192.168.204.2-150. Any other devices are beyond the scope of this assignment. Learning Outcomes After completing this exercise, you will be able to:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Perform a network scan using CIDR notation Scan for a specific port number Scan a range of port numbers & devices Your Devices You will be using the following devices in this lab. Please power these on now. Task 1 - Scan using CIDR notation CIDR notation looks like this: 192.168.204.0/24 . It contains the IP address 192.168.204.0 and the /24 represents the number of leading 1 bits in the subnet mask. You may have seen this subnet represented as 255.255.255.0. In binary, the subnet looks like this: 11111111 11111111 11111111 00000000. The leading 1 bits identify the network address, and the 0 bits represent the hosts. In this case the hosts can range from .1-.254 (because .0 and .255 are reserved). Step 1 Power on the PLABUbuntu and PLABKali devices. On the PLABUbuntu machine, open a terminal and run the following command. docker container list You should see several containers listed. If the containers do not show up, then there was a problem with the lab.
Step 2 Switch to the PLABKali machine. Open a terminal and type the following command to scan the network using the CIDR notation for the network. nmap 192.168.0.0/24 You should see a report that looks something like this. Step 3
You can also scan the network for a specific port number. Type the following command to identify all web servers. The --open specifies that nmap should not report hosts that have port 80 closed. nmap 192.168.0.2-150 -p 80 --open Step 4 Finally use this command to scan for all ports between 1024-65535. nmap 192.168.0.2-150 -p 1024-65535
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Step 5 On your own, use the examples above to identify all active hosts on the network and what services they are running. You will use this to answer questions in the following sections. Exercise 2 - Document Findings Learning Outcomes After completing this exercise, you will be able to: Identify servers, workstations, and printers from network scans Identify types of services based on port number Create a diagram of the network Your Devices You will be using the following devices in this lab. Please power these on now.
Task 1 - Write a Report Use the scans you performed in the previous exercise to construct your report. Submit 1. A one paragraph (min) to one page (max) written BLUF-format document of your understanding of this network. Use good analytic writing style. Assume that you’re writing to a somewhat technically- oriented boss or co-worker. 2. A network diagram that expresses your understanding of this network. Submit the diagram flattened to a PDF or image file, or as a page of your document. You can use Microsoft Visio, draw.io, or another tool to create this diagram. 3. A list of hosts that are found in the network. For each host identify what type of system it is (server, workstation, etc). Explain the purpose of the device and what services are running on it (FTP server, remote desktop, etc). 4. A list of port numbers that each of these hosts offers services from. 5. Any Indicators of Compromise (IOCs) that you might identify, or that you think are potentially suspicious. Include services that are known to be outdated/insecure. Keep all devices that you have powered on in their current state and proceed to the review section. Review Well done, you have completed the Network Mapping Practice Lab. Summary In this module, you will complete the following exercises: Exercise 1 - Scanning with Nmap Exercise 2 - Document Findings After completing this lab, you will be able to:
Scan hosts on a network using nmap Identify servers, workstations, and printers Identify types of services by port numbers Create a network diagram Feedback Shutdown all virtual machines used in this lab. Alternatively, you can log out of the lab platform.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help