Assessing The Network With Common Security Tools 3e - Merabi Takashvili
Assessing The Network With Common Security Tools 3e - Merabi Takashvili
Student: Email:
Merabi Takashvili [email protected]
4. Make a screen capture showing the ipconfig results for the Student adapter on the
vWorkstation.
Page 1 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
7. Make a screen capture showing the ipconfig results for the Student adapter on
TargetWindows01.
15. Make a screen capture showing the updated ARP cache on the vWorkstation.
Page 2 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
19. Make a screen capture showing the completed LAN tab of the Network Assessment
spreadsheet.
Page 3 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
12. Make a screen capture showing the ARP filtered results in Wireshark.
Page 4 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
18. Compare the Regular scan results for ICMP and ARP traffic with the results from the Ping
scan.
Intense Scan:
Purpose: An Intense scan is a comprehensive scan that checks a wide range of ports on a
target system.Method: It sends probes to each port to determine whether the port is open,
closed, or filtered, which helps identify potential vulnerabilities.Advantages: Provides detailed
information about open ports, services running on those ports, and potential security
issues.Disadvantages: Can be resource-intensive and might trigger intrusion detection
systems or firewalls due to its aggressive nature.
Ping Scan:
Purpose: A Ping scan, also known as an ICMP Echo scan, determines which hosts are online
by sending ICMP Echo Request packets.Method: It sends ICMP Echo Request packets to the
target hosts and waits for ICMP Echo Reply packets to determine if the hosts are
online.Advantages: Quick and efficient at identifying live hosts on the network.Disadvantages:
Limited in scope; it doesn't provide information about open ports or potential vulnerabilities.
Comparison:
Page 5 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
24. Compare the Intense scan results with the results from the Ping scan.
Intense Scan:
Purpose: An Intense scan is a comprehensive scan that checks a wide range of ports on a
target system.Method: It sends probes to each port to determine whether the port is open,
closed, or filtered, which helps identify potential vulnerabilities.Advantages: Provides detailed
information about open ports, services running on those ports, and potential security
issues.Disadvantages: Can be resource-intensive and might trigger intrusion detection
systems or firewalls due to its aggressive nature.
Ping Scan:
Purpose: A Ping scan, also known as an ICMP Echo scan, determines which hosts are online
by sending ICMP Echo Request packets.Method: It sends ICMP Echo Request packets to the
target hosts and waits for ICMP Echo Reply packets to determine if the hosts are
online.Advantages: Quick and efficient at identifying live hosts on the network.Disadvantages:
Limited in scope; it doesn't provide information about open ports or potential vulnerabilities.
Comparison:
Page 6 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
28. Make a screen capture showing the contents of the Ports/Hosts tab.
Page 7 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
Page 8 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
18. Make a screen capture showing the updated ARP cache on RemoteWindows01.
Page 9 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
22. Make a screen capture showing the completed WAN tab of the Network Assessment
spreadsheet.
9. Make a screen capture showing tcpdump echo back the captured packets.
Page 10 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
12. Make a screen capture showing the attempted three-way handshake in tcpdump.
Page 11 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
17. Make a screen capture showing the results of the get command.
Page 12 of 13
Assessing the Network with Common Security Tools (3e)
Network Security, Firewalls, and VPNs, Third Edition - Lab 01
UDP Traffic:
UDP packets are being sent from 10.0.1.3 to 202.20.1.1 on various destination ports (1233,
1234, 1235, etc.).The packets have varying lengths.
DNS Traffic:
DNS packets are being sent from 10.0.1.3 to 202.20.1.1 on port 53.The packets have an
invalid format,
ICMP echo
indicated
request
by the
andmessage
echo reply[length
packets
0 ICMP
are exchanged
Traffic: between 10.0.1.3 and
202.20.1.1.These packets are part of a ping (echo request and reply) communication
From thisbetween
output,the
wetwo
canhosts.
conclude that there is UDP, DNS, and ICMP traffic being sent to the
firewall (202.20.1.1). The DNS packets appear to be malformed, which may indicate some
issue with DNS communicatioopen ports are 22 and 80
Page 13 of 13
Powered by TCPDF (www.tcpdf.org)