Network Ports Lab - SeanSeymour/SYS140-Tech-Journal GitHub Wiki
ipconfig /all
Wireless LAN adapter Wi-Fi:
Connection-specific DNS Suffix . : hsd1.ma.comcast.net
Description . . . . . . . . . . . : NETGEAR A7000 WiFi USB3.0 Adapter
** Physical Address. . . . . . . . . : 44-A5-6E-64-17-9B
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2601:18f:701:6150::a0b2(Preferred)
Lease Obtained. . . . . . . . . . : Thursday, November 5, 2020 4:52:12 AM
Lease Expires . . . . . . . . . . : Thursday, November 12, 2020 1:48:05 PM
IPv6 Address. . . . . . . . . . . : 2601:18f:701:6150:41b3:3420:440a:3ad1(Preferred)
Temporary IPv6 Address. . . . . . : 2601:18f:701:6150:28f2:9294:9aee:9515(Preferred)
Link-local IPv6 Address . . . . . : fe80::41b3:3420:440a:3ad1%7(Preferred)
** IPv4 Address. . . . . . . . . . . : 10.0.0.93(Preferred)
** Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Thursday, November 5, 2020 4:52:09 AM
Lease Expires . . . . . . . . . . : Tuesday, November 10, 2020 7:43:25 PM
** Default Gateway . . . . . . . . . : fe80::461c:12ff:fed8:9c1f%7
10.0.0.1
DHCP Server . . . . . . . . . . . : 10.0.0.1
DHCPv6 IAID . . . . . . . . . . . : 105162094
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-1C-E5-40-04-92-26-D8-19-B0
DNS Servers . . . . . . . . . . . : 2001:558:feed::1
2001:558:feed::2
75.75.75.75
75.75.76.76
NetBIOS over Tcpip. . . . . . . . : Enabled
Host Address Range With Mask bits set to 27: 192.168.1.33 - 192.168.1.62
Host Address Range with Subnet Mask 255.255.255.0: 192.168.4.1 - 192.168.4.254
Ping Scan
cmd line: nmap -sn 10.0.0.1-254
1: 254 Hosts Scanned
2: 9 Hosts are up
3 Scanned in 2.99 Seconds
Quick Scan
cmd line nmap -T4 -F 10.0.0.1-254
-T4 -F Dictates how fast the scan is , the T standing for Timing.
1: 254 Hosts Scanned
2: 10 Hosts up
3: Scan took 8.13 seconds
4: The difference between the Ping scan and the Quick scan is that the quick scan had a more detailed outcome. The quick scan displayed the ports of each host and the status and the service the port provides if available.
Regular Scan
cmd line: nmap 10.0.0.1-254
1: 254 hosts scanned
2: 11 hosts up
3: Scan took 2297 seconds
4: The main thing I noticed is that the regular scan scanned a lot more ports and was able to filter through them.
Intense Scan
nmap -T4 -A -v 10.0.0.1-254
The -A option enables OS detection and enables tracer routes
The -v option increases the verbosity, meaning it gives a more in depth view of the scan that was performed.
Quick Scan Plus
nmap -sV -T4 -O -F --version-light 10.0.0.1-254
The -sV option opens ports to determine the service of the ports
The -O option enables OS detection
The --version-light option limits the scan to the most likely probes
Quick Scan Results
The host with the most open ports is 10.0.0.33
We started with a Ping Scan so that way we can see the progression of scans get better and better as we go along and do other scans. The Ping scan gave very basic information compared to the Regular Scan which provided lots of in depth information of each port and the job it provides.