Preview

Lab 01

Good Essays
Open Document
Open Document
424 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 01
Lab #1 – Assessment Worksheet
Performing Reconnaissance and Probing Using Common Tools
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you explored the common tools available in the virtual lab environment. You used
Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator, connected to a remote
Windows machine, and explored two file transfer applications, FileZilla and Tftpd64. You used
PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart.
Lab Assessment Questions & Answers
1. Name at least five applications and tools used in the lab.
Wireshark, OpenVAS, NetWitness Investigator, and FileZilla

2. What is promiscuous mode?
Allows a network device to intercept and read each network packet that arrives in its entirety.

3. How does Wireshark differ from NetWitness Investigator?
Wireshark provides detailed information about network traffic down to the packet level. However, many are unable to completely understand the information being displayed. NetWitness translates a large packet capture session into readable data.

4. Why is it important to select the student interface in the Wireshark?
Choosing the public network will prevent Wireshark from seeing traffic that is related to the lab

5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of
172.30.0.0/24?
nmap -T4 -A -v 172.30.0.0/24

2 | Lab #1: Performing Reconnaissance Using Common Tools
6. Name at least five different scans that may be

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Lab 10

    • 1213 Words
    • 5 Pages

    Take a screen shot of the Devices and Printers control panel with the new printer icon you created by pressing Alt+Prt Scr, and then paste the resulting image into the lab09_worksheet file in the page provided by pressing Ctrl+V.…

    • 1213 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    LAB 6

    • 5674 Words
    • 23 Pages

    CHM130 Lab 6 Exploring Density Name A. Data Tables Place your completed Data Tables here Part IIIa (3 points) Volume of water in graduated cylinder (mL)10 mlMass of rubber stopper (g)11.15Volume of water and rubber stopper (mL)16.5 Part IIIb (6 points) Volume of water in graduated cylinder (mL)20Mass of iron nail (g)3.66Volume of water and iron nail (mL)20.5 Part IV (20 points) Type of Aluminum FoilMass (g)Length (cm)Width (cm)Volume (cm3)Thickness (cm)Regular.63g15 cm 10.02 cm.21 cm3.0014 cm Heavy Duty.97g15 cm10.01 cm .36 cm3.0024 cm B. Follow Up Questions Show all work for questions involving calculations. Part I Use the concepts/vocabulary of density to explain why the liquids formed layers in Part I of the procedure. (8 pts) The liquids formed layers because they all had different densities. The liquids with light density were towards the top of the layers. What was the control used during the liquid portion of Part I of this experiment (8 pts) (Hint What did you do the same with each liquid to ensure a fair comparison) The control used during the portion of part I was the amount of liquid used. Rank the following in terms of relative density (9 pts) Isopropyl alcohol (rubbing alcohol) lowest relative density Liquid dishwashing detergent- intermediate relative density Dark corn syrup-high relative density Vegetable oil-second lowest relative density (intermediate) Glycerin-second highest relative density Rubber stopper- second highest relative density Cork stopper- low relative density (ended up with the alcohol Wood- low relative density (ended at the top with the rubber alchohol. Lead- highest relative density Part II (7 pts each) In Part II, what happened to the cans of soda when you placed them in water Use the concepts/vocabulary of volume and mass to explain the final positions of the cans in the sink full of water. The diet soda floated in the water while the regular soda sank. The regular soda had a higher relative…

    • 5674 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Subnetting Lab 3 Unit 4 Lab 1. Connected Routes - Page 61 2. Configuring IP Addresses I - Page 64 3. Configuring IP Addresses II - Page 66 4. Static Routes I - Page 68 5.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab I was able to accomplish by using the show commands I learned how to investigate the network status. Not only will the benefit my professional career but it will also help me in the course on how to trouble shoot and learn the basics.…

    • 1117 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    Task 4, Step 1: Paste a screenshot AFTER you execute the “show ip route” command. (2 points)…

    • 436 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays