OmotoyinboA W11 Project - Network Fingerprinting

docx

School

Brigham Young University, Idaho *

*We aren’t endorsed by this school

Course

102

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

3

Uploaded by DeaconHeatBadger24

Report
Network Fingerprinting Executive summary This project visualizes the network topology and maps the physical location of devices on a home network. The network was scanned using the Zenmap software to analyze device availability, open/closed ports, operating systems, and online/offline status. Zenmap enables inventory and mapping of private networks. The scan demonstrates the logical connections between devices and their placement within the physical home space. This provides insight into the overall home network architecture. The software can be downloaded on their official website. https://nmap.org/ The first step was to install and run the software for the first time. The intense scan was the option to have a complete scan of the network as shown in the picture below.
The second step was to analyze the graphical topology and then relate all the devices on a table. IP Description Location 192.168.85.1 Router (Gateway, DHCP) Rack 192.168.85.2 Access Point 1 Bedroom 192.168.85.3 Access Point 2 Living Room 192.168.85.13 Linux machine Lab 192.168.85.26 Macbook pro Lab 192.168.85.185 CCTV – HIKIVISION Rack 192.168.85.203 Android Phone John Mobile 192.168.85.239 Ipad Mobile 192.168.85.245 Android Phone Victoria Mobile Utilizing the Zenmap network scanning tool underscored the value of properly surveying my home network. Initially daunting, after hands-on practice I was able to comprehend the utility and operate it effectively. The software enabled detection of all open ports and vulnerabilities across devices on my network. Armed with this insight, I implemented measures to secure my network from potential threats. Mastering such tools is critical for understanding and protecting
the integrity of modern smart home environments. My experience has equipped me to proactively identify and address security risks through routine network scans.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help