W23_SPR100_Lab_7v1
docx
keyboard_arrow_up
School
Seneca College *
*We aren’t endorsed by this school
Course
100
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by ElderLeopardMaster1065
SPR100
Labs
Lab 7:
Network Security (2%)
Overview:
In this lab we’ll be looking at foot-printing, scanning and enumeration. We will be scanning one machine,
to discover what services are running, then the Security Lab network to discover what machines and the
services are running.
To do this will be using a tool called
Nmap
, the “world’s most popular network
security scanner”. Finally, you will look at the traffic generated by Nmap to get a sense of how much
network communication is involved in a scan.
Warning:
Do not use Nmap to scan ANY
network unless you have explicit permission to scan that
network.
If you ignore this warning, you might become a subject of a complaint to the Toronto Police Service or
the RCMP, because it could be considered "unauthorized access to a computer system", and some scans
can lead to a DoS on poorly configured systems.
You might be able to argue against this successfully, but it
might require the services of a lawyer, and your equipment might be confiscated while the argument takes
place. Even without police involvement, you might end up losing the services of your ISP.
Consider yourself warned.
You have permission to scan:
The internal network in the Security Lab.
You do not have permission to scan any other networks at Seneca.
Note:
Part 2 and Part 3: you need to be using the Win10 VM and be connected to the Security Lab
network.
Part 4: this is to be done on your home workstation/laptop.
All screenshots must have your command-line title with name, date and time visible
Objective:
1.
Demonstrate how to footprint a company.
2.
Scanning of a single server.
3.
Scanning and enumeration a network.
4.
Understanding the cost of a scan.
Page 1 of 4
SPR100
Labs
The Lab Activities
Part 1: Foot-printing (Internet)
Foot-printing involves determining the following:
The scope of the footprint – an organization, a subnet or a machine.
Searching public web sites and databases for organization and network information that may be
useful to plan an attack against known vulnerabilities.
Network reconnaissance—determining network topology, access points and DNS record
information.
Steps
1.
View the
Seneca College
website. Look through the website’s various pages
.
Is there any information
that could be used by a potential (hacker) attacker? Be specific.
2.
Using a browser, go to
whois.cira.ca
and conduct a
whois
search of “senecacollege.ca” on the
Canadian Internet Registration Authority. What displayed information could be useful to an attacker?
Be specific.
3.
No entry is required in your lab report.
NB: Any public search engine can be used for foot-printing e.g. Google.
Part 2: Scanning a Single Machine (Security Lab)
Once a target has been identified and public information exhausted, the next step is to probe the specific
target network by using automated tools to scan the workstations for the following information:
Which workstations are “online”?
IP address of the workstation
Ports and services being used by the workstation.
Scanning and enumeration are often combined since many of the automated tools perform both tasks
simultaneously. This step requires an active connection to the system and directed queries. As such, the
attacker must be logged on. The types of information enumerated are generally:
Network resources and shares – ports, processes, and shares
Users and group accounts\passwords
Running applications\OSs and versions
Armed with the information gathered the attacker research to find specific vulnerabilities to find “a way
in”. It is common for an attacker to spend 3-4 months completing all three steps before launching an
attack.
This lab will introduce the methodology. Performing automated ‘ping’ sweep to determine which
machines are “alive”.
The ‘ping’ command is used to test connectivity; however, it can only test one
machine at a time.
Before you start, using your Window’s 10 VM command line, ‘ping’ the single IP address:
172.16.11.65
(you need to be on the Security Lab network to do this).
If you do not know the ‘ping’ command or how to use the ‘command-line’ on your Window’s 10 VM, do
some research.
Do the following using
Nmap
(Zenmap) installed on your
Window’s 10
VM and targeting the given single IP
address. Below this is referred to an “IP”.
Page 2 of 4
SPR100
Labs
Steps
1.
Scan the
IP
using the
Ping scan
setting. What sort of information are you getting – look at the
Nmap output tab?
2.
Repeat Step 1 for a Quick scan and Intense Scan.
What is the difference between the information
you are getting for the Ping, Quick and Intense scan? Be specific.
3.
After the
Intense
scan look at
all the other tabs
such as ‘Ports/Hosts’. How does the information
differ from the “Nmap output” tab?
4.
Write up the results of (2) to (4) and insert it into your report under the heading of “
Nmap and the
172.16.11.65 server
”.
Ensure your formatting aids the reader in reading what you have written.
Part 3: Scanning and Enumeration of a Network (Security Lab)
If we are to learn about what is happening on our network, rather than just one computer, we should be
familiar with the basic protocols, and service identification.
You should understand the significance of port numbers, so you should know which port numbers are
associated with these commonly used services:
HTTP & HTTPS
DNS
DHCP (bootp)
SSH
TELNET
FTP
SMTP
NetBIOS
Microsoft-DS
Look up any port numbers that show up on your Nmap scans, this will give you an idea of what they do.
Before you use Nmap, read and understand
the nmap man page
. If you do not take the time to understand
the output of Nmap, you will end up wasting lots of time.
A Short History of Nmap
Zenmap
Zenmap User’s Guide
32 Useful Nmap Commands
Using Nmap, scan the
Security Lab network: 172.16.11.0/26
(you need to be on the Security Lab network
to do this) and discover hosts that are listening. You need a quick and simple scan to discover hosts, and
more complex scans to find out information about each host discovered. Please note, this scan can take a
while, so be patient! What is the number of IP addresses in this range?
Look over the resources mentioned at the start of the lab. Decide on some other interesting scans to try on
the servers you have discovered.
Questions:
1.
How many hosts are available on the scanned network?
2.
How many hosts are running the following services? Give their IPs: ftp
Write up the results of (1) and (2) and insert it into your report under the heading of “
Nmap and the
Security Lab Network
” with appropriate subheadings.
Ensure your formatting aids the reader in reading
what you have written.
Page 3 of 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
SPR100
Labs
Part 4: Determining the cost of a scan (Home)
Doing a scan of a network and host on the network might seem the obvious and easiest thing to do.
Such
scans generate traffic.
Let’s capture that traffic and see how much there is.
Note:
There is only general guidance given for this part of the lab.
You are expected to do research etc.
to find out any information you don’t know.
You’ll be using Kali Linux and Windows 10 for this lab.
Before you start:
Download Kali (if you have not already done so)
Steps
1.
Set-up a private LAN connection between Kali and Windows 10
2.
Verify that both your VMs are on the network by pinging the Kali VM from the Win10 VM
3.
Start Wireshark on your
Win10
VM and begin Capture.
4.
Using the
command-line
on Kali, use Nmap to do
an intense scan
of your
Win10
VM
5.
Stop your Wireshark capture on
Win10
VM once the Nmap scan is complete.
6.
Review your Wireshark capture to see the volume of traffic an ‘uncontrolled’ scan can generate.
7.
Under a heading “
Scan Costs”
in your report,
take the following screenshots
and insert them under
the appropriate sub-headings that show the following:
The
Win10
VM IP’s address
The
Kali
VM’s IP address
Kali’s desktop with the
command-line window visible
and some of Nmap results visible.
Make sure
the
Nmap command you used is visible
in the screenshot.
Wireshark open showing the:
Start of the
Win10
VM scan’s capture – make sure it is clear that there is no scan in the first
half of the Wireshark output and then scan in the second half of the Wireshark output in the
image.
Mid-section of the
Win10
VM scan’s capture – nearly all packets should be
between the Win
10 VM and the Kali VM.
End of the
Win10
VM scan’s capture – make sure it is clear that there is a scan if the first half
of the Wireshark output and then no scan in the second half of the Wireshark output in the
image.
8.
Answer the following questions and insert them into your report.
What did you have to do to set up the private LAN Segment and get the computers connected?
What sort of protocols were used in the attack from Kali?
Report Submission
Now that you have filled out the Lab report, you need to submit it along with your elog book. This is done
through the submission link given with Lab 7 on Blackboard.
Page 4 of 4