please do the question from 2-5 and send sscreenshot for each question let me know if the image is still unclear i hope the questions
please do the question from 2-5 and send sscreenshot for each question
let me know if the image is still unclear
i hope the questions image are now clear
i have posted the picture of the question already please see it fully before commenting
thanks
lol this tile you are doing this purposely. anyways i have posted the same questiond again. u need to zoom it and have a look
if question is not visible then zoom in
do not comment this time or else will have to report you
Lab 4 Scouting and Fingerinting the map and Nicat PART 1 - NMP 4. What is the total target Romance report whet! Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab! . nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap . lila Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask:255.255.255.0 Use ifconfig to check for the tunnel interface created by openVPNL 1. Use the nmap -e argument to map networks over the tunnel. INTRO WAT BEST tilted PORTERE Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find and thinni Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions. Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what changes? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab1 nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap O X Debian-be-VMware Workstation File Edit View VM Tabs Help 11 Debon. Applications - Places Terminal - Tue 11:15 rootekali- File Edit View Search Terminal Help Tootekali-apt-get install nmap Reading package Lists... Done Building dependency tree Reading state information... Done map is already the newest version (7.88+dtsgi-lkalil). map set to manually installed. e upgraded, newly installed, e to remove and 477 not upgraded. rootokoli ::: Te direct input to this VM. move the mouse pointer inside er press Chile Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by root@kali:- File Edit View Search Terminal Help inet 192.168.188.147 netmask 255.255.255.e broadcast 192.168.188.255 Inet6 fe80::200:29T1:7e65:a3c5 prefixlen 64 scopeid 0x20 ether be: 00:29:65:a3:c5 txqueuelen 1968 (Ethernet) RX packets 31001 bytes 16911300 (16.1 MB) RX errors dropped o overruns o frame TX packets 21990 bytes 4581395 (4.3 MIB) Tx errors o dropped o overruns e carrier collisions to flagc-73-UP, LOOPBACK, RUNNING mtu 65536 1 L 12, 0, 0,1 netmask 255.0.0.0 Ineto 1:1 prefixten 128 scopeid Ox10 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 Exqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KIB) RX errors o dropped o overruns o frame TX packets 52 bytes 2849 (2.7 KB) TX errors o dropped overruns e carrier o collisions LL open VPN 1. Use the nmap -e argument to map networks over the tunnel. root@kali: # nmap -e tune 10.8.0.0/24 Starting Nmap 7.80 ( https:/map.org ) at 2019-09-24 01:26 EDT Nmap scan report for 10.8.0.1 Host is up (0.015s latency). Not shown: 999 filtered ports PORT STATE SERVICE 53/tcp open domain Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions. Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what changes? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab1 nmap and ncat Follow these instructions to verify your nmap installation PART 1-NMAP Verify nmap installation using command sudo apt-get install nmap X Debian 9.x 64-bit - VMware Workstation VM Tabs Help II File Edit View G 1 O 7 Home Debian 9.X 64-bit Applications Places Terminal Tue 11:15 root@kali: - File Edit View Search Terminal Help root@kali:-# apt-get install nmap Reading package lists. . . Done Building dependency tree Reading state information... Done nmap is already the newest version (7.80+dfsg1- ikalil). nmap set to manually installed. upgraded, newly installed, to remove and 477 not upgraded. root@kali:-# TCPA-443-lal M U Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by openVPN root@kali: - File Edit View Search Terminal Help pfSeinet 192.168.188.147 netmask 255.255.255.0 broadcast 192.168.188.255 TCP4-4 inet6 fe80::200:29ff:fe65:a3c5 prefixlen 64 scopeid ox20 ether 00:00:29:65:a3:05 txqueuelen 1000 (Ethernet) RX packets 31601 bytes 16911300 (16.1 MiB) RX errors 0 dropped overruns o frame o TX packets 21990 bytes 4581395 (4.3 MiB) TX errors dropped overruns o carrier 0 collisions pr Sense lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid ex10 loop txqueuelen 1000 (Local Loopback) RX packets 107 bytes 5510 (5.3 KiB) RX errors 0 dropped o overruns frame 0 TX packets 107 bytes 5510 (5.3 KiB) TX errors 0 dropped overruns carrier 0 collisions o tune: flags=4305 mtu 1500 inet 10.10.10.2 netmask 255.255.255.0 destination 10.10.10.2 inet6 fe80::71e0:4b3c:2933: cdda prefixlen 64 scopeid Ox20 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KiB) RX errors 0 dropped overruns 0 frame 0 TX packets 52 bytes 2849 (2.7 KiB) TX errors 0 dropped overruns o carrier collisions C root@kali: Lab 4 Scouting and Fingerinting the map and Nicat PART 1 - NMP 4. What is the total target Romance report whet! Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab! . nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap . lila Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask:255.255.255.0 Use ifconfig to check for the tunnel interface created by openVPNL 1. Use the nmap -e argument to map networks over the tunnel. INTRO WAT BEST tilted PORTERE Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find and thinni Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions. Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what changes? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab1 nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap O X Debian-be-VMware Workstation File Edit View VM Tabs Help 11 Debon. Applications - Places Terminal - Tue 11:15 rootekali- File Edit View Search Terminal Help Tootekali-apt-get install nmap Reading package Lists... Done Building dependency tree Reading state information... Done map is already the newest version (7.88+dtsgi-lkalil). map set to manually installed. e upgraded, newly installed, e to remove and 477 not upgraded. rootokoli ::: Te direct input to this VM. move the mouse pointer inside er press Chile Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by root@kali:- File Edit View Search Terminal Help inet 192.168.188.147 netmask 255.255.255.e broadcast 192.168.188.255 Inet6 fe80::200:29T1:7e65:a3c5 prefixlen 64 scopeid 0x20 ether be: 00:29:65:a3:c5 txqueuelen 1968 (Ethernet) RX packets 31001 bytes 16911300 (16.1 MB) RX errors dropped o overruns o frame TX packets 21990 bytes 4581395 (4.3 MIB) Tx errors o dropped o overruns e carrier collisions to flagc-73-UP, LOOPBACK, RUNNING mtu 65536 1 L 12, 0, 0,1 netmask 255.0.0.0 Ineto 1:1 prefixten 128 scopeid Ox10 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 Exqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KIB) RX errors o dropped o overruns o frame TX packets 52 bytes 2849 (2.7 KB) TX errors o dropped overruns e carrier o collisions LL open VPN 1. Use the nmap -e argument to map networks over the tunnel. root@kali: # nmap -e tune 10.8.0.0/24 Starting Nmap 7.80 ( https:/map.org ) at 2019-09-24 01:26 EDT Nmap scan report for 10.8.0.1 Host is up (0.015s latency). Not shown: 999 filtered ports PORT STATE SERVICE 53/tcp open domain Always ensure nmap traffic must be routed over the VPN tunnel for this lab. Use nmap to answer the following questions. Questions: For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what For each question, provide the terminal command used and Screen shots to produce your answer. If you not able to find anything, justified why? 1. How many hosts are online on the provided network? 2. What host is currently filtering all network ports? 3. Run a nmap scanning with UDP selected. Why would this provide a different result? 4. What is the total range of network ports? How many does a default nmap scan look at? 5. Run a nmap scan across the entire port range, what changes? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from lab1 nmap and ncat Follow these instructions to verify your nmap installation PART 1-NMAP Verify nmap installation using command sudo apt-get install nmap X Debian 9.x 64-bit - VMware Workstation VM Tabs Help II File Edit View G 1 O 7 Home Debian 9.X 64-bit Applications Places Terminal Tue 11:15 root@kali: - File Edit View Search Terminal Help root@kali:-# apt-get install nmap Reading package lists. . . Done Building dependency tree Reading state information... Done nmap is already the newest version (7.80+dfsg1- ikalil). nmap set to manually installed. upgraded, newly installed, to remove and 477 not upgraded. root@kali:-# TCPA-443-lal M U Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by openVPN root@kali: - File Edit View Search Terminal Help pfSeinet 192.168.188.147 netmask 255.255.255.0 broadcast 192.168.188.255 TCP4-4 inet6 fe80::200:29ff:fe65:a3c5 prefixlen 64 scopeid ox20 ether 00:00:29:65:a3:05 txqueuelen 1000 (Ethernet) RX packets 31601 bytes 16911300 (16.1 MiB) RX errors 0 dropped overruns o frame o TX packets 21990 bytes 4581395 (4.3 MiB) TX errors dropped overruns o carrier 0 collisions pr Sense lo: flags=73 mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen 128 scopeid ex10 loop txqueuelen 1000 (Local Loopback) RX packets 107 bytes 5510 (5.3 KiB) RX errors 0 dropped o overruns frame 0 TX packets 107 bytes 5510 (5.3 KiB) TX errors 0 dropped overruns carrier 0 collisions o tune: flags=4305 mtu 1500 inet 10.10.10.2 netmask 255.255.255.0 destination 10.10.10.2 inet6 fe80::71e0:4b3c:2933: cdda prefixlen 64 scopeid Ox20 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KiB) RX errors 0 dropped overruns 0 frame 0 TX packets 52 bytes 2849 (2.7 KiB) TX errors 0 dropped overruns o carrier collisions C root@kali
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance