Perform Reconnaissance with NMAP (credit to MindTap)
You work as a security analyst for a small corporation. Your manager has asked you to check the external servers of a potential partner's company for potentially vulnerable ports. The company hosts an external web server at www.partnercorp.xyz.
In this lab, your task is to perform reconnaissance on the PartnerCorp external servers to find potentially vulnerable ports as follows:
On Analyst-Lap
- Use the whois.org website to determine the domain name servers used by PartnerCorp.xyz.
- Answer Question 1.
- Use nslookup to determine the primary web server address.
- Answer Question 2.
On Analyst-Lap2
- Use Zenmap to search for 50 of the top ports opened on the network identified by nslookup above.
- Answer Question 3.
EXPLANATION
Complete this lab as follows:
- From the Analyst-Lap computer, find the domain name servers used by partnercorp.xyz.
- From the taskbar, select Google Chrome.
- Maximize the the windows for better viewing.
- In the URL field, type whois.org and press Enter.
- In the Search for a domain name field, enter partnercorp.xyz.
- Select Search.
- In the top right, select Answer Questions.
- Answer Question 1.
- Find the IP address used by www.partnernetcorp.xyz.
- Right-click Start and select Windows PowerShell (Admin).
- At the PowerShell prompt, type nslookup www.partnercorp.xyz name_server (see the answer to question 1) and press Enter.
- Answer Question 2.
- Minimize the Lab Questions dialog.
- Use Zenmap to run an Nmap command to scan for open ports.
- From the navigation tabs, select Buildings.
- Under Blue Cell, select Analyst-Lap2.
- From the Favorites bar, select Zenmap
- Maximize Zenmap for easier viewing.
- In the Command field, use nmap --top-ports 50 73.44.215.0/24 to scan for open ports.
- Select Scan to scan for open ports on all servers located on this network.
- In the top right, select Answer Questions.
- Answer Question 3.
- Select Score Lab.
Comments
Post a Comment