Dar Es Salaam Institute of Technology: Lab 3 Report
Dar Es Salaam Institute of Technology: Lab 3 Report
TECHNOLOGY
LAB 3 REPORT
SECURITY
PARTICIPANTS
Scanning Methodology
The Scanning Methodology includes the following step:-
● Checking for live systems
● Discovering open ports
● Scanning beyond IDS
● Banner grabbing
● Scanning Vulnerability
● Network diagram
● Proxies
Scanning Techniques
They are categorized into three categories:
I. Scanning ICMP network services
II. Scanning TCP network services
III. Scanning UDP network services
ICMP Scanning
ICMP scanning is used for identifying active devices and determining whether
ICMP can pass through a firewall.
Ping Sweep
A Ping sweep is used to determine the range of IP addresses that are mapped to
active devices. This, in turn, enables them to create an inventory of active devices
in the subnet.
TCP Connect
TCP connect scan used for detecting open ports upon the completion of the
three-way handshake. It works by establishing a full connection and then
dropping it by sending an RST packet.
Stealth Scan
Stealth scan is used for bypassing firewall and logging mechanisms. It works by
resetting the TCP connection before the three-way handshake is completed,
which in turn makes the connection half-open.
Similarly, the port is also considered to be open if the WINDOW value is not 0 (zero). Otherwise,
the port is considered to be closed.
UDP Scanning
UDP scanning uses the UDP protocol to test whether the port is open or closed. In this scan,
there is no flag manipulation. Instead, ICMP is used to determine if the port is open or not. So, if
a packet is sent to a port and the ICMP port unreachable packet is returned, then that means
that the port is closed. If, however, there is no response, then the port is open.
Zmap
2. To scan the members in the network 192.168.43.52, Scan the ip addresses from range
of 192.168.43.0-192.168.43.255 using subnet notation 192.168.43.52/24
3. Using nmap (Zenmap) provide the range and the type of scan as follows
4. The network has two connected hosts identified by 192.168.43.1 and 192.168.43.207