Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Provide the terminal command used. Answer questions from 5-8 and provide screenshot of the code in nmap or kali and your answer and justify it

Provide the terminal command used. Answer questions from 5-8 and provide screenshot of the code in nmap or kali and your answer and justify it by giving reason. image text in transcribed
image text in transcribed
The Target server address is 10.8.0.0
and subnet mask is 255.255.255.0
network address is 10.8.0.0
subnet mask 255.255.255.0
image text in transcribed
image text in transcribed
PART 2: NCAT Follow these instructions to verify your ncat installation Verify nmap installation using command sudo apt-get install ncat Application Places Terminal Tue 11:16 File Edit View Such Termural Help GOTERALES apt-get install ncat Reading package lists. Done Building dependency tree Reading state information... Done ncat is already the newest version 07.10+dfsg-akalin). upgraded.newly instalted, to remove and 477 not upgraded ret . A. By this point you should now have identified a number of unknown services running in the network. STATE SERVICE open ssh open telnet open unknown Ncat is a networking tool that can be used find more details about a specific service running on a network. 1. Use the command ncat -v target ip port_number rootekali: # ncat -v 192.168.0.1 22 Replace the IP address and port in the example with your target. Use the results to answer the following: 5. Describe another way to get the HTML from the webserver. 6. What command would you use to banner grab SMTP? 7. How would you banner grab the following protocols: TFTP DNS POP SNMP NTP iSCSI 8. What is the IP address of the host that displays your group number? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from labl nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap O Debian 6-hr- VMware Workstation File Edit View VM Tabs Help 11 Debian. Applications - Places Terminal Tue 11:15 rootkali:- File Edit View Search Terminal Help rootkali-apt-get install nmap Reading package lists... Done Building dependency tree Reading state information... Done map is already the newest version (7.88+dfsgl-lkal11). map set to manually installed. e upgraded, newly installed, e to remove and 477 not upgraded. root kalite 4 ::: Te direct input to this VM move the mouse pointer insider press Cirile Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by root@kali:- File Edit View Search Terminal Help inet 192.168.188.147 netmask 255.255.255.2 broadcast 192.168.188.255 inet6 fe80::200:29 7:7e65:a3c5 prefixten 64 scopeid 6x20cLinks ether 68: 0029:65:a3:05 txqueuelen 1968 (Ethernet) RX packets 31601 bytes 16911390 (16.1 MB) Rx errors @dropped @ overruns o frame @ TX packets 21990 bytes 4581395 (4.3 MB) Tx errors o dropped 0 overruns o carrier o collisions to flagc-73-UP, LOOPBACK, RUNNING mtu 65536 1 PHI 12 0, 0,1 netmask 255.0.0.0 Ineto 1:1 prefixlen 128 scopeid Ox10 loop txqueuelen 1000 (Local Loopback) RX packets 107 bytes 5510 (5.3 K1R) RX errors o dropped overruns o frame TX packets 107 bytes 5510 (5.3 KIB) TX errors o dropped overruns carrier o collisions Tuno flags4305 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KIB) RX errors o dropped overruns o frame TX packets 52 bytes 2849 (2.7 KB) TX errors o dropped overruns e carrier o collisions ALL openVPN PART 2: NCAT Follow these instructions to verify your ncat installation Verify nmap installation using command sudo apt-get install ncat Application Places Terminal Tue 11:16 File Edit View Such Termural Help GOTERALES apt-get install ncat Reading package lists. Done Building dependency tree Reading state information... Done ncat is already the newest version 07.10+dfsg-akalin). upgraded.newly instalted, to remove and 477 not upgraded ret . A. By this point you should now have identified a number of unknown services running in the network. STATE SERVICE open ssh open telnet open unknown Ncat is a networking tool that can be used find more details about a specific service running on a network. 1. Use the command ncat -v target ip port_number rootekali: # ncat -v 192.168.0.1 22 Replace the IP address and port in the example with your target. Use the results to answer the following: 5. Describe another way to get the HTML from the webserver. 6. What command would you use to banner grab SMTP? 7. How would you banner grab the following protocols: TFTP DNS POP SNMP NTP iSCSI 8. What is the IP address of the host that displays your group number? Scouting and Fingerprinting using Nmap and Ncat The following are required for this lab: A working installation of kali linux Internet Access Functioning VPN from labl nmap and ncat Follow these instructions to verify your nmap installation PART 1 - NMAP Verify nmap installation using command sudo apt-get install nmap O Debian 6-hr- VMware Workstation File Edit View VM Tabs Help 11 Debian. Applications - Places Terminal Tue 11:15 rootkali:- File Edit View Search Terminal Help rootkali-apt-get install nmap Reading package lists... Done Building dependency tree Reading state information... Done map is already the newest version (7.88+dfsgl-lkal11). map set to manually installed. e upgraded, newly installed, e to remove and 477 not upgraded. root kalite 4 ::: Te direct input to this VM move the mouse pointer insider press Cirile Use the following network information for this lab: Target network: 10.8.0.0 Subnet Mask: 255.255.255.0 Use ifconfig to check for the tunnel interface created by root@kali:- File Edit View Search Terminal Help inet 192.168.188.147 netmask 255.255.255.2 broadcast 192.168.188.255 inet6 fe80::200:29 7:7e65:a3c5 prefixten 64 scopeid 6x20cLinks ether 68: 0029:65:a3:05 txqueuelen 1968 (Ethernet) RX packets 31601 bytes 16911390 (16.1 MB) Rx errors @dropped @ overruns o frame @ TX packets 21990 bytes 4581395 (4.3 MB) Tx errors o dropped 0 overruns o carrier o collisions to flagc-73-UP, LOOPBACK, RUNNING mtu 65536 1 PHI 12 0, 0,1 netmask 255.0.0.0 Ineto 1:1 prefixlen 128 scopeid Ox10 loop txqueuelen 1000 (Local Loopback) RX packets 107 bytes 5510 (5.3 K1R) RX errors o dropped overruns o frame TX packets 107 bytes 5510 (5.3 KIB) TX errors o dropped overruns carrier o collisions Tuno flags4305 unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 UNSPEC) RX packets 39 bytes 5400 (5.2 KIB) RX errors o dropped overruns o frame TX packets 52 bytes 2849 (2.7 KB) TX errors o dropped overruns e carrier o collisions ALL openVPN

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 19th International Conference Dexa 2008 Turin Italy September 2008 Proceedings Lncs 5181

Authors: Sourav S. Bhowmick ,Josef Kung ,Roland Wagner

2008th Edition

3540856536, 978-3540856535

More Books

Students also viewed these Databases questions

Question

Describe three other types of visual aids.

Answered: 1 week ago