week 2 activity 1 Perform Reconnaissance with Nmap in Comp Tia
Required Actions & Questions
Your answer: NS1.NETHOST.NET
Correct answer: NS1.NETHOST.NET, NS2.NETHOST.NET
Your answer: 198.28.1.1
Correct answer: 198.28.1.1
Your answer: 198.28.1.2
Correct answer: 198.28.1.3, 198.28.1.4
Explanation
In this lab, your task is to perform reconnaissance on www.corpnet.xyz and to find potentially vulnerable ports on the servers in the CorpNet networks as follows:
- On Consult-Lap, use the Whois.org site to determine the domain name servers used by www.corpnet.xyz.
- On Consult-Lap, use nslookup to determine the primary web server address.
- On Consult-Lap2, use Zenmap to perform an nmap search for open ports for the 198.28.1.0/24 network.
- Answer the questions.
Complete this lab as follows:
- Find the name servers used by www.corpnet.xyz as follows:
- From the taskbar, open Chrome.
- In the URL field, type whois.org and press Enter.
- In the Search for a domain name filed, enter www.corpnet.xyz.
- Select Search.
- In the top right, select Answer Questions.
- Answer question 1.
- Find the IP address used by www.corpnet.xyz as follows:
- Right-click Start and select Windows PowerShell (Admin).
- At the prompt, type nslookup www.corpnet.xyz ns1.nethost.net and press Enter.
- Answer question 2.
- Minimize the question dialog.
- Use Zenmap to run an nmap command to scan for open ports as follows:
- From the navigation tabs, select Buildings.
- Under Red Cell, select Consult-Lap2.
- From the Favorites bar, open Zenmap.
- Maximize Zenmap for easier viewing.
- In the Command field type nmap -p- 198.28.1.0/24.
- Select Scan to scan for open ports on all servers located on this network.
- In the top right, select Answer Questions.
- Answer question 3.
- Select Score Lab.
Comments
Post a Comment