0% found this document useful (0 votes)
68 views9 pages

LAb 1

This document provides instructions for a lab activity analyzing network traffic using Nmap. The activity has students install and launch Nmap to perform various scans of an IP address, including intense, operating system detection, service version detection, and regular scans. Students are to answer questions based on the scan results, such as finding their current IP address, listing running services, identifying the operating system, and describing whether a computer can have multiple IP addresses or open ports. The document also asks students to briefly describe 8 software programs related to network security.

Uploaded by

Siti Aisyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views9 pages

LAb 1

This document provides instructions for a lab activity analyzing network traffic using Nmap. The activity has students install and launch Nmap to perform various scans of an IP address, including intense, operating system detection, service version detection, and regular scans. Students are to answer questions based on the scan results, such as finding their current IP address, listing running services, identifying the operating system, and describing whether a computer can have multiple IP addresses or open ports. The document also asks students to briefly describe 8 software programs related to network security.

Uploaded by

Siti Aisyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

LAB 1 : NETWORK MAPPER (NMAP)

Duration: 2 Hours

CLO2 - Analyze information security vulnerabilities to encounter threats and attacks


using various tools. (P2, C4, PLO2, PLO1)

Learning Outcomes

By the end of this laboratory session, you should be able to:

1. Analyses Network traffic using Nmap.

Activity
Activity Outcome: Analyses Network traffic using Nmap.

Procedure
Step1: Install and launch the NMAP Umit program.
Step 2: After installation finish. Open Nmap Umit program. To do so click Start → All
Programs → Nmap → Umit.

Step 3: Select a Target and a Profile and click Scan.

Step 4: Scan Report: The following figure shows the Nmap output for the Intense Scan.

+
--192.168.1.1
Step 5: The following figure shows the ports and hubs of the Intense Scan

192.168.1.1

Step 6: The Host Details of the Intense Scan are shown in the following figure.

192.168.1.1
Step 7: The Scan Details for the Intense Scan are shown in the following figure:

192.168.1.1

Step 8: The Nmap Output for the Operating System Detection is shown in the following
figure:

192.168.1.1
Step 9: The Nmap Output for Quick Full version Detection Scan is shown in the following
figure:

192.168.1.1

Step 10: The Nmap Output for the Quick Operating System detection is shown in the
following figure:

192.168.1.1
Step 11: The Nmap Output for Quick Scan is shown in the following figure:

192.168.1.1

Step 12: The Nmap for the Quick Services version detection is shown in the following figure:

192.168.1.1
Step 13: The Nmap Output for the Quick and Verbose scan is shown in the following figure:

192.168.1.1

Step 14: The Nmap Output for the Regular Scan is shown in the following figure:

192.168.1.1
Lab Exercise

A. Nmap
Instructions:
1. Install Nmap
2. Answer the questions below. Include screenshot as proof of your answer.
3. All the answer for questions below must be accessed from Nmap software

1. Find your current IP address by using nmap?

2. List 4 services/ application that running in your pc?

3. What is the operating system used in your pc?

4. Instead of just using one IP address, is it possible to have multiple IP address for ur
pc? Explain your answer.

5. What is open port? Do you currently have an open port in your pc? Explain your
answer.

B. Softwares
1. Give a brief description ech software listed below:

a) Stinger
b) CWS Shredder
c) Microsoft Anti Spyware Software
d) Safecryptor
e) Abc Chaos
f) Polar Crypto Light
g) Encryptonclick
h) Open Source Virtual Machine

You might also like