SYS140 Network Ports - eitan-j/tech-journal GitHub Wiki
SUBMISSION: Open a command prompt and run the command ipconfig /all and put the output for ONLY your LAN IP address in your GitHub submission and put two asterisks next to your IP address, Physical Address, Subnet Mask, and Default Gateway.
Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Killer Wireless-n/a/ac 1535 Wireless Network Adapter Physical Address. . . . . . . . . : **9C-B6-D0-C5-96-C5 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::cd0f:dbe2:d8a3:9e95%10(Preferred) IPv4 Address. . . . . . . . . . . : **69.5.123.14(Preferred) Subnet Mask . . . . . . . . . . . : **255.255.255.128 Lease Obtained. . . . . . . . . . : Sunday, November 8, 2020 3:53:41 PM Lease Expires . . . . . . . . . . : Sunday, November 8, 2020 4:33:18 PM Default Gateway . . . . . . . . . : **69.5.123.1 DHCP Server . . . . . . . . . . . : 204.13.41.66 DHCPv6 IAID . . . . . . . . . . . : 261928656 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-94-74-A0-9C-B6-D0-C5-96-C5 DNS Servers . . . . . . . . . . . : 204.13.41.10 204.13.41.13 204.13.40.14 NetBIOS over Tcpip. . . . . . . . : Enabled
SUBMISSION: If you were told the "SCOPE" of your scan is all hosts within the subnet: 192.168.1.32/27, what is the "Host Address Range" you are allowed to scan? Use http://www.subnet-calculator.com/ and enter the IP address and the "27" as the "Mask Bits." List the range of IP addresses you can scan.
192.168.1.33 - 192.168.1.62
SUBMISSION: If you were told the "SCOPE" of your scan is all hosts within the subnet: 192.168.4.0/255.255.255.0, what is the "Host Address Range" you are allowed to scan? Use http://www.subnet-calculator.com/ and enter the IP address and the "255.255.255.0" as the "Subnet Mask." List the range of IP addresses you can scan.
192.168.4.1 - 192.168.4.254
SUBMISSION: What is the nmap command displayed in the Command window?
nmap -sn 69.5.123.1-126
SUBMISSION: Look at the Nmap Options Summary Page. What does the option –sn specify?
Ping Scan - disable port scan
Click Scan and wait for your scan to complete. Provide a synopsis of your results including:
- the number of hosts scanned
126 - the number that are up
87 - how long the scan took.
4.33 seconds
SUBMISSION:What is the nmap command displayed in the Command window?
nmap -T4 -F 69.5.123.1-126
SUBMISSION: Look at the Nmap Options Summary Page. What do the options –T4 and -F mean?
-T4: Set timing template to 4 (higher is faster)
-F: Fast mode - Scan fewer ports than the default scan
SUBMISSION: Click Scan and wait for your scan to complete. Provide a synopsis of your results (use the table below) including:
- the number of hosts scanned
126 - the number that are up
86 - how long the scan took
219.12 seconds - explain what is different about these results versus the ping scan. Provide details in your response. What specifically is different?
Both result include the MAC address of the hosts. The quick scan scans 100 ports and shows if they are open, closed, or filtered
SUBMISSION: What is the nmap command displayed in the Command window?
nmap 69.5.123.1-126
SUBMISSION: Click Scan and wait for your scan to complete. Provide a synopsis of your results including:
- the number of hosts scanned
N/A - the number that are up
N/A - how long the scan took
N/A - The synopsis for this section must compare the results with the results from above and emphasize any differences. (What differences are there between this scan and the “Quick Scan.”)
N/A
SUBMISSION: Choose each of these profiles and record the nmap commands. Use the Options Summary Page to compare the options used by each.
Intense Scan | |
---|---|
Command | nmap -T4 -A -v 69.5.123.1-126 |
-A option | Enable OS detection, version detection, script scanning, and traceroute |
-v option | Increase verbosity level (use -vv or more for greater effect) |
Quick Scan Plus | |
---|---|
Command | nmap -sV -T4 -O -F --version-light 69.5.123.1-126 |
-sV option | Probe open ports to determine service/version info |
-O option | Enable OS detection |
--version-light | Limit to most likely probes (intensity 2) |
Which host on your network has the most network ports open? (You may see more on your own hosts because you are scanning from it so exclude your system).
N/A
Why did we start this assignment with a ping scan first?
Because it is faster and gives less information.