ITT-111-SAvilaTopic4Assignment2

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

121

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by CoachExplorationApe24

Report
Network Reconnaissance and Troubleshooting Network reconnaissance is the process of gathering information about a target network in order to identify potential vulnerabilities and weaknesses. This is an essential step in any successful cyber-attack, as it allows the attacker to gain a better understanding of the target's infrastructure and security measures. There are several methods that can be used for network reconnaissance, including passive and active scanning techniques. Passive scanning involves monitoring network traffic and analyzing data packets to identify potential targets, while active scanning involves sending probes or requests to specific IP addresses or ports. The information gathered during network reconnaissance can be used to launch a variety of attacks, including denial-of-service attacks, phishing scams, and malware infections. It is therefore crucial for organizations to implement strong security measures that can detect and prevent these types of attacks. Overall, network reconnaissance plays a critical role in modern cyber warfare. By gathering intelligence on potential targets, attackers can launch more effective and devastating attacks that can cause significant damage to businesses and individuals alike. Troubleshooting is the process of identifying and resolving problems that arise in any system. It is an essential skill that every individual should possess, as it helps to maintain the smooth functioning of any system. Troubleshooting requires a logical approach, patience, and attention to detail. The first step in troubleshooting is to identify the problem. This involves gathering information about the symptoms and analyzing them to determine the root cause . Once the problem has been identified , the next step is to develop a plan of action. This may involve testing various components or running diagnostic tools to isolate the issue. The final step in troubleshooting is resolving the problem. This may involve repairing or replacing faulty components or adjusting settings on a device or system. The key to successful troubleshooting is persistence and perseverance until a solution has been found . In conclusion, troubleshooting is an important skill that can be applied in various fields such as technology, medicine, engineering, and much more. Fing Day Monda y Tuesd ay Wednes day Thursd ay Frida y Saturd ay Time 1 # of Hosts 11 13 17 15 14 12 Time 14 12 16 15 12 13
2 # of Hosts Time 3 # of Hosts 13 12 16 14 14 12 Fing is an application used to scan the current network a device is connected to. It scans how many devices are using the network, what their IP address is, and their host names. Within the Fing application, the user can access detailed information about each device connected to the network. That includes the devices brand name, possible release date of that product, and operating system that device might be using. I believe my results were based on the amount of people that were at my house over the week. The numbers were not consistent; however, the collection of data was not far off from each other. NMAP Day Monda y Tuesd ay Wednes day Thursd ay Frida y Saturd ay Time 1 # of Hosts 1 1 1 1 1 1 Time 2 # of Hosts 1 1 1 1 1 1 Time 3 # of Hosts 1 1 1 1 1 1
Nmap, short for Network Mapper, it is a powerful open-source tool used for network scanning and security auditing . Nmap uses various techniques to sc an n etworks and identify hosts, services, operating systems, and vulnerabilities. It can be used to perform simple ping sweeps or complex scans that include port scanning, version detection, OS fingerprin ting, a nd scriptable interaction with target systems. One of the key advantages of Nmap is its flexibility. It can be run on a variety of platforms including Windows, Linux, macOS, and even mobile devices. During my scans using NMAP, I was the only was using my network during the morning and evening. It was different than using Fing because NMAP tracks the number of devices scanning the network. Overall, the two scanning tools are essential when working with computers and networks. Fing has many benefits that are more user-friendly, while NMAP can be more in depth in coding. The difference between the two can be based on the users’ preferences. I enjoyed using the user- friendly network scanner, Fing. The NMAP network scanner was interesting in a more skillful way, which I enjoyed as well. The steps on both scanning tools are fairly easy to complete. Network is required to complete these steps and tools such and internet access. In circumstances that require one to check the devices connected to their network or scan to see if any other devices are scanning the network, Fing and NMAP are great tools to use. Overall, the two scanning tools are essential when working with computers and networks. Fing has many benefits that are more user-friendly, while NMAP can be more in depth in coding. The difference between the two can be based on the users’ preferences. I enjoyed using the user- friendly network scanner, Fing. The NMAP network scanner was interesting in a more skillful way, which I enjoyed as well. The steps on both scanning tools are fairly easy to complete.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help