Assessing_the_Network_with_Common_Security_Tools_3e_-_Makayla_Stewart

pdf

School

John A. Logan College *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

12

Uploaded by CaptainGalaxy13867

Report
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 Student: Email: Makayla Stewart makstewart101@gmail.com Time on Task: Progress: 1 hour, 2 minutes 100% Report Generated: Sunday, January 21, 2024 at 6:50 PM Section 1: Hands-On Demonstration Part 1: Explore the Local Area Network 4. Make a screen capture showing the ipconfig results for the Student adapter on the vWorkstation . Page 1 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 7. Make a screen capture showing the ipconfig results for the Student adapter on TargetWindows01 . 15. Make a screen capture showing the updated ARP cache on the vWorkstation . Page 2 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 19. Make a screen capture showing the completed LAN tab of the Network Assessment spreadsheet . Part 2: Analyze Network Traffic 9. Make a screen capture showing the ICMP filtered results in Wireshark . Page 3 of 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 12. Make a screen capture showing the ARP filtered results in Wireshark . 18. Compare the Regular scan results for ICMP and ARP traffic with the results from the Ping scan. Ping scan identify the host on our network which identify all IP addresses that are currently online with our sending packet requests. Where as, regular scan synchronize all TCP ports using ICMP echo request. 24. Compare the Intense scan results with the results from the Ping scan. Intense scan is as similar as the regular scan. TCP ports using SYN packet that also scan UDP ports also. Page 4 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 28. Make a screen capture showing the contents of the Ports/Hosts tab . Page 5 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 Section 2: Applied Learning Part 1: Explore the Wide Area Network 6. Make a screen capture showing the ifconfig results on AttackLinux01 . Page 6 of 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 12. Make a screen capture showing the ipconfig results on RemoteWindows01 . 18. Make a screen capture showing the updated ARP cache on RemoteWindows01 . Page 7 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 22. Make a screen capture showing the completed WAN tab of the Network Assessment spreadsheet . Part 2: Analyze Network Traffic Page 8 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 9. Make a screen capture showing tcpdump echo back the captured packets . Page 9 of 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 12. Make a screen capture showing the attempted three-way handshake in tcpdump . Page 10 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 17. Make a screen capture showing the results of the get command . Page 11 of 12
Assessing the Network with Common Security Tools (3e) Network Security, Firewalls, and VPNs, Third Edition - Lab 01 Section 3: Challenge and Analysis Part 1: Explore the DMZ Make a screen capture showing the completed DMZ tab of the NetworkAssessment spreadsheet . Part 2: Perform Reconnaissance on the Firewall Briefly summarize and analyze your findings in a technical memo to your boss. There were 2 ICMP packets sent to the firewall. Total of 4 ARP packets send to the firewall, Yes, 4 DNS packets were sent to the firewall. Port 22 ssh and port 80 http (both comes under protocol tcp) are open on the pfSense firewall. Powered by TCPDF (www.tcpdf.org) Page 12 of 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help