Lab1
Lab1
Lab 1 Report
Zachary C. White
Liberty University
CSCI 501
different devices together via network connections allow users to share files, provide the
medium for text and real-time communication. Computer networks also provide for an
Lab 1.7 Describe the steps involved in a TCP handshake and some key differences between
TCP and UDP, particularly with regard to speed, overhead, and reliability.
establish a TCP session. First, a client sends a SYN (or synchronization) segment with a
randomly selected sequence number. The recipient of the SYN replies with its own SYN
and acknowledges (ACK) the SYN it received. Then the original client sends an ACK
acknowledging the SYN it received. Then, the client starts sending DATA (RFC793,
1981).
With respect to the differences between TCP and UDP, the main difference is that UDP is
acknowledgements that ensures that all data reaches its destination. Also, TCP has a
multitude of error-checking mechanisms that ensure that DATA hasn’t been corrupted or
changed in transit. These mechanisms that provide increased reliability also generate
additional overhead when compared to the light, connectionless UDP. With TCP, if a
packet gets lost in transit, TCP will cause that lost DATA to be retransmitted. With UDP,
there is no resend or feature allowing for the retransmission of lost data. For all intents
LAB 1 REPORT 3
and purposes, UDP is a “fire and forget” type protocol. Because UDP lacks some of
these error checking and correction mechanisms, the speed of data transfer is quicker.
Lab 1.10 Explain the concept of a connection port and the difference between an open port
A connection port is a port associated with the Transport Layer of the OSI Model that is
Nmap.org, an open port is a state in which “an application is actively accepting TCP
connections, UDP datagrams, or SCTP associations on this port” (Nmap, n.d.). “A closed
port is accessible (it receives and responds to Nmap probe packets), but there is no
application listening on it” (Nmap, n.d.). The status of these connection ports is
important in allowing the Nmap application to gather information about the devices on
10.3.0.5
Lab 2.14 Describe the differences between the Ping scan and the Quick scan results. Also,
LAB 1 REPORT 4
note what operating system (OS) is suspected for the 10.3.1.1 host.
Based on the output, the Ping scan only sends ICMP echo requests out to every possible
IP address within the parameters assigned by the scan. The results are hosts on the
network that return an ICMP reply. In this lab, 6 hosts responded to ping – 10.3.1.1,
10.3.1.2, 10.3.1.6, 10.3.1.7, 10.3.1.10, and 10.3.1.250. The Quick scan returns much
more detail than the ping scan. Quick scan scans the top 100 TCP ports for the defined
network parameter and returns the port state and what application (service) the port
belongs to. The Quick scan shows that at this point, the Operating System (OS) is
unknown, however you can make assumptions of the type of server that 10.3.1.1 is by the
Lab 2.17 Make a screen capture showing the ports and services that were discovered for the
10.3.1.1 host.
TCP/80 (HTTP), TCP/443 (HTTPS), and TCP/3306 (SQL) were discovered in the open
Lab 2.18 Make a screen capture showing which OS was positively identified for the 10.3.1.1
host.
LAB 1 REPORT 5
Lab 2.19 Make a screen capture showing the exact version of the Web service running for the
10.3.1.1 host.
The 10.3.1.1 host is running Apache httpd 1.3.28 (Unix) mod_ssl/2.8.15 OpenSSL/0.9.7c.
Lab 3.5 Make a screen capture showing the saved scans on the desktop.
Ping Scan
Quick Scan
Intense Scan
CQ 4.1 There are two other subnets in this lab environment. Minimize the Student Kali
machine to return to the lab topology. Open a machine from one of the other
networks in this lab and determine the subnet address. Do the same for the third
LAB 1 REPORT 6
10.3.2.0/24
Other than the 10.3.1.0/24 network (the network scanned in the first part of the lab), there
CQ 4.2 Use Zenmap to run an Intense scan of the entire virtual network. Make a screen
capture showing the results and document all the ports and services running on that
Subnet Services
10.3.0.0/24 http, msrpc, netbios-ssn, quagga (routing), vnc, vnc-http, zebra (routing)
ChallengeScan.nmap
CQ 4.3 Use Zenmap to produce a topology diagram of the entire virtual network. Ensure
that all the hosts are visible on the diagram. Make a screen capture showing the
LA 1 What are some reasons an information security professional would scan a system or
network of systems?
Scanning a system for open ports and protocols helps that information security
professional with identifying what applications are enabled on a particular system. It also
can assist the IT security team with establishing a baseline that can be used to compare
systems over time. Additionally, scanning a system can assist administrators with
identifying unneeded open ports that can be disabled, thereby reducing the attack surface
of the system.
LA 2 Why is it important to learn at least a few commonly used ports and their associated
services ?
of the well-known ports and protocols assists administrators with troubleshooting and
LAB 1 REPORT 9
oriented transmission and how might this handshake assist in network scanning?
persistent sessions that allow the passing of DATA. An administrator can utilize these
TCP features in order to gather information about a system. Just a few types of TCP
scanning are TCP connect(), TCP SYN, TCP FIN, and more! Nmap utilizes features of
TCP in order to query information about the host in which it connects. Connection-
LA 4 Between TCP and UDP, which protocol requires less overhead and is generally
faster?
User Datagram Protocol (UDP). UDP is a connection-less protocol that does not have
many of the error correction and retransmission mechanisms that TCP has. UDP is
essentially a “fire and forget” protocol – it is not concerned with whether or not the
receiver of the DATA actually gets it. This lack of protocol overhead in comparison to
modifications have been made that a verification process be followed in order to ensure
LAB 1 REPORT 10
intuitive graphical user interface (GUI) to allow professionals who are not familiar with
LA 7 If you wanted to use Nmap for command-line scanning, how would Zenmap help?
Zenmap would be a useful tool because based on all of the options and scan parameters
selected by the user, it creates and displays the Nmap commands that can be entered into
the command-line.
LA 8 What were some of the different scan profile types you used in Zenmap?
For Lab 1, we utilized Ping scan, Quick scan, and Intense scan. The Ping scan simply
sends ICMP echo requests to every possible host address within a subnet. The Quick
scan incorporates a port scan of the top 100 common TCP ports, and the Intense scan is
able to determine the Operating System of the host (along with version) and also the
LA 9 What scan profile type can you use to positively identify a system’s OS ?
Intense scan.
LA 10 True or False: The Zenmap application allows you to graphically present the full
scanned topology.
True. An example of this is Challenge Question 4.3 above.
LA 11 True or False: The scans performed in Zenmap are automatically saved for later
References
Request for Comment (RFC) 793 - Transmission Control Protocol. (1981, September). Retrieved
from https://tools.ietf.org/html/rfc793
basics.html