SYS140 Network Ports - eitan-j/tech-journal GitHub Wiki

SUBMISSION: Open a command prompt and run the command ipconfig /all and put the output for ONLY your LAN IP address in your GitHub submission and put two asterisks next to your IP address, Physical Address, Subnet Mask, and Default Gateway.

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Killer Wireless-n/a/ac 1535 Wireless Network Adapter
   Physical Address. . . . . . . . . : **9C-B6-D0-C5-96-C5
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::cd0f:dbe2:d8a3:9e95%10(Preferred)
   IPv4 Address. . . . . . . . . . . : **69.5.123.14(Preferred)
   Subnet Mask . . . . . . . . . . . : **255.255.255.128
   Lease Obtained. . . . . . . . . . : Sunday, November 8, 2020 3:53:41 PM
   Lease Expires . . . . . . . . . . : Sunday, November 8, 2020 4:33:18 PM
   Default Gateway . . . . . . . . . : **69.5.123.1
   DHCP Server . . . . . . . . . . . : 204.13.41.66
   DHCPv6 IAID . . . . . . . . . . . : 261928656
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-94-74-A0-9C-B6-D0-C5-96-C5
   DNS Servers . . . . . . . . . . . : 204.13.41.10
                                       204.13.41.13
                                       204.13.40.14
   NetBIOS over Tcpip. . . . . . . . : Enabled

SUBMISSION: If you were told the "SCOPE" of your scan is all hosts within the subnet: 192.168.1.32/27, what is the "Host Address Range" you are allowed to scan? Use http://www.subnet-calculator.com/ and enter the IP address and the "27" as the "Mask Bits." List the range of IP addresses you can scan.

192.168.1.33 - 192.168.1.62

SUBMISSION: If you were told the "SCOPE" of your scan is all hosts within the subnet: 192.168.4.0/255.255.255.0, what is the "Host Address Range" you are allowed to scan? Use http://www.subnet-calculator.com/ and enter the IP address and the "255.255.255.0" as the "Subnet Mask." List the range of IP addresses you can scan.

192.168.4.1 - 192.168.4.254

SUBMISSION: What is the nmap command displayed in the Command window?

nmap -sn 69.5.123.1-126

SUBMISSION: Look at the Nmap Options Summary Page. What does the option –sn specify?

Ping Scan - disable port scan

Click Scan and wait for your scan to complete. Provide a synopsis of your results including:

  1. the number of hosts scanned
    126
  2. the number that are up
    87
  3. how long the scan took.
    4.33 seconds

SUBMISSION:What is the nmap command displayed in the Command window?

nmap -T4 -F 69.5.123.1-126

SUBMISSION: Look at the Nmap Options Summary Page. What do the options –T4 and -F mean?

-T4: Set timing template to 4 (higher is faster)
-F: Fast mode - Scan fewer ports than the default scan

SUBMISSION: Click Scan and wait for your scan to complete. Provide a synopsis of your results (use the table below) including:

  1. the number of hosts scanned
    126
  2. the number that are up
    86
  3. how long the scan took
    219.12 seconds
  4. explain what is different about these results versus the ping scan. Provide details in your response. What specifically is different?
    Both result include the MAC address of the hosts. The quick scan scans 100 ports and shows if they are open, closed, or filtered

SUBMISSION: What is the nmap command displayed in the Command window?

nmap 69.5.123.1-126

SUBMISSION: Click Scan and wait for your scan to complete. Provide a synopsis of your results including:

  1. the number of hosts scanned
    N/A
  2. the number that are up
    N/A
  3. how long the scan took
    N/A
  4. The synopsis for this section must compare the results with the results from above and emphasize any differences. (What differences are there between this scan and the “Quick Scan.”)
    N/A

SUBMISSION: Choose each of these profiles and record the nmap commands. Use the Options Summary Page to compare the options used by each.

Intense Scan
Command nmap -T4 -A -v 69.5.123.1-126
-A option Enable OS detection, version detection, script scanning, and traceroute
-v option Increase verbosity level (use -vv or more for greater effect)
Quick Scan Plus
Command nmap -sV -T4 -O -F --version-light 69.5.123.1-126
-sV option Probe open ports to determine service/version info
-O option Enable OS detection
--version-light Limit to most likely probes (intensity 2)

Which host on your network has the most network ports open? (You may see more on your own hosts because you are scanning from it so exclude your system).

N/A

Why did we start this assignment with a ping scan first?

Because it is faster and gives less information.

⚠️ **GitHub.com Fallback** ⚠️