Lab 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Lab 4

Cyberspace security

Sheridan College Institute of Technology and Advanced Learning


Faculty of Applied Science and Technology

Eesh Kumar Kancham


Part1: Nmap (5 marks)

Let’s assume that you are the network engineer in a mall and wants to figure out what device is
connected to the network. You have a tool for network scanning called Nmap. Apply the following steps
and practice different commands to know what kind of service, operating system and check whether
there is a weakness in the network or not:

1. Install Nmap:
- Nmap is available for download on the official website (https://nmap.org/download.html). Once you
have downloaded the appropriate package for your operating system, follow the installation instructions
to install Nmap.

2. Open a terminal or command prompt - Nmap is a command-line tool, so you'll need to open a
terminal or command prompt to use it.
3. you can Open a terminal or command prompt - Nmap is a command-line tool, so you'll need to
open a terminal or command prompt to use it.

Using ipconfig to find ip of the device to run scans on

4. Run a scan - To run a basic Nmap scan, simply type "nmap" followed by the IP address or
hostname of the target system. For example, to scan a system with the IP address 172.16.36.135, you
would enter "nmap 172.16.36.135 ". This will run a basic scan that will identify open ports and the
services running on them.
5. Another way is to open the terminal, we will see a default command
nmap -T4 -A -v 172.16.36.135: scan all information this IP address Practice on how to use scan
options - Nmap offers a variety of scan options that can be used to customize the scan to meet your
needs. For example, you can use the "-sS" option to perform a stealth scan, which attempts to avoid
detection by firewalls and intrusion detection systems. You can also use the "-p" option to specify a
range of ports to scan. (nmap -sS 172.16.36.135 -p 80)

Default:
Provides comprehensive details including OS, services, and scripts.

Stealth ;

Performs a stealthy scan of port 80 to avoid detection.

6. Practice the following commands to practice an advanced scan (for example, determine the
versions for the services running on each port, so that we can determine if they are out of date and
potentially vulnerable to exploitation):
- Use nmap -p- for scanning all ports.

Scans all 65535 ports for open services.

- Use nmap -O to detect operating system

Attempts to identify the operating system of the target.


- Use nmap -sV to detect version.

Identifies services and their versions running on open ports.

- Use nmap --script=vuln to detect vulnerability

Uses scripts to find known vulnerabilities on the target.


- Scan the following site: scanme.nmap.org

Provides a detailed scan including OS detection, services, and vulnerabilities

8. for all the sub steps in 7, provide a screenshot for the output. Explain the results in details

Each step screenshots for the process have been attached


Wireshark (5 marks)

After using the Wireshark tool, you would be:

- Be able to explain the purpose of a protocol analyser

- Be able to perform basic Protocol Data Unit (PDU) capture using Wireshark

- Be able to perform basic analysis on straightforward network data traffic

- Be able to use packet analyser tool and analyse a network of your choice.

1. Use Wireshark tool from the following website https://downloads.digitaltrends.com/wireshark/windows

2. Select download for free trail (windows installer), then install the application:

- Practise applying the capture option to capture PDUs/ Packet (PDU: Protocol Data Unit is the
basic unit of exchange between entities that communicate using a specified networking
protocol.)

- Explain the results and provide the steps of applying the Wireshark
We can see the wifi connection has a go-d transfer of packets we can go into it and check log to to anise the
packets

This is the captured packets when we run wire shark on the systems wifi connection
There are many protocols being used we can filter the protocols we want to see and analyse like :

Example these are the tcp flags


Filtering the packets by ip address to know from where the packets are coming and going
We can filter and analyse multiple options to get clarity on what all the communication is happening
through packets .

You might also like