0% found this document useful (0 votes)
3 views3 pages

Lab 3

This document outlines the steps for analyzing a port scan using a Linux VM (recommended Kali) and a Windows machine. It includes instructions for finding the Windows IP address, disabling the firewall, performing ping sweeps and scans using Zenmap, and analyzing network traffic with Wireshark. The final submission requires a file named 'YourName_StudentID_Lab3' in docx or PDF format.

Uploaded by

claytonjo578
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Lab 3

This document outlines the steps for analyzing a port scan using a Linux VM (recommended Kali) and a Windows machine. It includes instructions for finding the Windows IP address, disabling the firewall, performing ping sweeps and scans using Zenmap, and analyzing network traffic with Wireshark. The final submission requires a file named 'YourName_StudentID_Lab3' in docx or PDF format.

Uploaded by

claytonjo578
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab 3 - ANALYZING A PORT SCAN

Name: (required)
Student ID: (required)

0. What You Need

 A Linux VM machine, recommended Kali.


 Your Windows machine

1. Finding the IP Address of Your Windows Machine

Using ipconfig command to see your IP address.

Make a note of this IP address.

2. Turning off your Windows Firewall

3. Starting your Kali Linux Virtual Machine

Launch your Linux virtual machine.

Pinging the Windows Machine From the Linux Virtual Machine

In the Terminal window, ping the IP address of your Windows machine.

ping 192.168.1.101

When the ping is working properly, Ctrl+C to stop it.

4. Starting Wireshark network analyzer (on your Kali Linux VM)

Start Capture on your active network adapter (ie. Wifi).

5. Performing a Ping sweep using Zenmap (on your Kali Linux VM)

In the "Profile" box, select "Ping Scan".

In the Target box, enter the network address of the network containing both your Kali
and Windows machines, followed by the CIDR notation number, (eg. 192.168.1.0/24).

Note: Since there might be too many IP addresses within your current network, consider
using static ones for your machines.
When the sweeping completes, you should see a list of the hosts that were found on
your network. You should detect at least two hosts of your Linux and Windows machines.

Paste the captured screenshot here.

6. Using Wireshark to analyze the Ping sweep

In the Wireshark, click Capture, Stop. You should see a lot of ARP requests as below, you
may filter by ARP to get them clearly.

Why are there ARPs here?

7. Performing an Quick Scan of the Windows Machine

In the Zenmap window, enter the IP address of your Windows machine in the Target
field. Select a Profile of "Quick Scan", as shown below on this page.

When the scan completes, you should see a list of open ports including "135/tcp open".

8. Starting a new Wireshark capture

9. Performing a Connect Scan of port 135 only

In the Zenmap window, select a Profile of "Intense scan, all TCP ports".

Notice the Command line. It should be as follow:


nmap -sT -p 135 -T4 -v 192.168.119.219
10. Using Wireshark to analyze the connect scan

In the Wireshark Window, click Capture, Stop.

In the Filter box, type this filter:

tcp.port==135

The Info column should show this pattern of four packets. Paste the screenshot here.

What are they?

What are they for?

Submission: name this file as "YourName_StudentID_Lab3" in docx / PDF format.

You might also like