Module 1-Assignment 1.1 Operating a port scanner

docx

School

Northern Virginia Community College *

*We aren’t endorsed by this school

Course

276

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by JusticeAntelope23233

Report
Screenshot 1: Target IP entered in Nmap Screenshot 2: Results after initial scan Screenshot 3: 'Ports/Hosts' tab showing port details.
Screenshot 4: 'Host Details' tab Screenshot 5: Results after scanning a different IP (if applicable).
Carlos Menjivar 1/25/2024 ITN 266 1. Challenges Encountered: In Nmap, the system wasn’t as user-friendly, and it was quite difficult to grasp at first. It does have a lot of features and getting used to the syntax for the commands required some time to understand along with figuring out what the difference is between the scan types.Installation and Setup: Although the installation process was clear to get through, making sure that each step was done properly was critical to ensure correct installation. Nmap and Zenmap were part of the software installed and Npcap.Ethical and Legal Compliance: There were certain permissions needed to ensure that all scans were done to align with the ethical hacking standards and done in a secure space.Result Interpretation: Using Nmap was complex since it required understanding which ports are safe or malicious and in-depth understanding of how the network are protocol’s function. 2. Nmap Findings: The scan done on Nmap allowed to identify which network services of the host are active using IP 10.0.0.208. With the tool, I was able to verify the status and get an idea of the network’s configuration. It also provided information on the network interface of the host. The scan done on Nmap allowed to identify which network services of the host are active using IP 10.0.0.208. With the tool, I was able to see the status and get an idea of the network’s configuration. It also provided information of the network interface of the host which aligns with network/security professionals that seek to diagnose the state of the network and security audits. 3. Details on Open Ports: Through this scan there were a few open ports that stood out. For example, Port 135, which acts like a gateway for communication, also serves as a target for network invasions since it can activate processes remotely. Port 139 is reserved for the NetBIOS sessions and using for file sharing but is a threat for exploits, therefore it should be disabled when not in use. Port 445 is used by the SMB protocol which carries file sharing but has been known to be susceptible to cyber-attacks and requires constant patches and authentication. 4. Security Implications of Open Ports: Port 135 (msrpc): This port serves the function for enabling remote procedure calls on Windows but can be exploited by attackers if it is not properly secured. Port 139 (netbios-ssn): Mainly used for NetBIOS, this port can also be exploited by attackers seeking to access network resources in an unsecure way. This can result in man-in-the-middle type of attacks. Port 445 ( microsoft-ds): In this case, the Port 445 is used for SMB file sharing and printer services. It is very vulnerable and has been exploited on multiple occasions by ransomware attacks. It is a huge security issue if not secure through firewall policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
5. Detailed Explanation Screenshots: Screenshot 2: This visual depicts the Nmap Output tab after the scan is done and the list of open ports along with the services they provide. These results also share information about what potential vulnerabilities could exist. Known ports are usually associated with the services from Windows networks and could lead to attacks because of their vulnerability. Screenshot 4: Here we’re shown information such as the status of the host and combining open ports into the system’s network configuration. The operating system is also given which is a great piece to know since it can assist an attacker with created exploits that are targeted to users and can help a defender to add hardening skills specific to the OS. Screenshot 5: In this screenshot, the visual shows what happens when another IP address is tested to be scanned, resulting in it being non-responsive. This gives an example of the different network defense levels that exist across many systems. This could occur because the network is well-secured or indicates that firewalls are set in place to get rid of incoming traffic scanning.