Scan for open ports from a remote computer (credit to MindTap)
You are the security analyst for a small corporate network. You have decided to test how secure the company's network would be if a rogue wireless access point was introduced.
To do this, you have connected a small computer to the switch in the Networking Closet. This computer also functions as a rogue wireless access point. You are now sitting in your van in the parking lot of your company, where you are connected to the internal network through the rogue wireless access point. Using the small computer you left behind, you want to test running remote exploits against the company.
In this lab, your task is to:
- Use ssh -X to connect to your rogue computer (192.168.0.251).
- Use 1worm4b8 as the root password.
- Use Zenmap on the remote computer to scan all the ports on the internal network and look for computers vulnerable to attack.
- Answer the questions.
EXPLANATION
Complete this lab as follows:
- Connect to the network using the rouge system.
- From the Favorites bar, select Terminal.
- At the prompt, type ssh -X 192.168.0.251 and press Enter.
- For the root password, type 1worm4b8 and press Enter.
You are now connected to Rogue1.
- Scan the network using Zenmap.
- Type zenmap and press Enter to launch Zenmap remotely.
Zenmap is running on the remote computer, but you see the screen locally. - In the Command field, type nmap -p- 192.168.0.0/24.
- Select Scan.
- Type zenmap and press Enter to launch Zenmap remotely.
- Analyze the scan results and answer the questions.
- From the results, find the computers with ports open that make them vulnerable to attack.
- In the top right, select Answer Questions.
- Answer the questions.
- Select Score Lab.
Comments
Post a Comment