Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap)
LAb #1 – ASSESSMENT WORKSHEET
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Course Name and Number: Student Name:
Lab due date:
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note:
These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program.
Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify
whether that application starts as a service on the system or must be run manually.
windows applicaTion loaded
1. 2. 3. 4. 5.
sTarTs as service Y/n
q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No
tftpd32 filezilla wireshark Nessus NetWitness Investigator
Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,
LAN Switch 2, and the IP default gateway router?
TagetWindows01 Server- Source IP = 172.30.0.8 TargetUbuntu01 Server – Source IP = 172.30.0.4 TargetUbuntu02 Server – Source IP = 172.30.0.9 The Default Gateway IP is = 172.30.0.1
3. Did the targeted IP hosts respond to the ICMP echo-request packet...
Please join StudyMode to read the full document