Lab 4
Lab 4
Lab 4
Cyberspace security
Let’s assume that you are the network engineer in a mall and wants to figure out what device is
connected to the network. You have a tool for network scanning called Nmap. Apply the following steps
and practice different commands to know what kind of service, operating system and check whether
there is a weakness in the network or not:
1. Install Nmap:
- Nmap is available for download on the official website (https://nmap.org/download.html). Once you
have downloaded the appropriate package for your operating system, follow the installation instructions
to install Nmap.
2. Open a terminal or command prompt - Nmap is a command-line tool, so you'll need to open a
terminal or command prompt to use it.
3. you can Open a terminal or command prompt - Nmap is a command-line tool, so you'll need to
open a terminal or command prompt to use it.
4. Run a scan - To run a basic Nmap scan, simply type "nmap" followed by the IP address or
hostname of the target system. For example, to scan a system with the IP address 172.16.36.135, you
would enter "nmap 172.16.36.135 ". This will run a basic scan that will identify open ports and the
services running on them.
5. Another way is to open the terminal, we will see a default command
nmap -T4 -A -v 172.16.36.135: scan all information this IP address Practice on how to use scan
options - Nmap offers a variety of scan options that can be used to customize the scan to meet your
needs. For example, you can use the "-sS" option to perform a stealth scan, which attempts to avoid
detection by firewalls and intrusion detection systems. You can also use the "-p" option to specify a
range of ports to scan. (nmap -sS 172.16.36.135 -p 80)
Default:
Provides comprehensive details including OS, services, and scripts.
Stealth ;
6. Practice the following commands to practice an advanced scan (for example, determine the
versions for the services running on each port, so that we can determine if they are out of date and
potentially vulnerable to exploitation):
- Use nmap -p- for scanning all ports.
8. for all the sub steps in 7, provide a screenshot for the output. Explain the results in details
- Be able to perform basic Protocol Data Unit (PDU) capture using Wireshark
- Be able to use packet analyser tool and analyse a network of your choice.
2. Select download for free trail (windows installer), then install the application:
- Practise applying the capture option to capture PDUs/ Packet (PDU: Protocol Data Unit is the
basic unit of exchange between entities that communicate using a specified networking
protocol.)
- Explain the results and provide the steps of applying the Wireshark
We can see the wifi connection has a go-d transfer of packets we can go into it and check log to to anise the
packets
This is the captured packets when we run wire shark on the systems wifi connection
There are many protocols being used we can filter the protocols we want to see and analyse like :