An attacker has discovered a vulnerable computer with the IP address 192.168.201
ID: 3720787 • Letter: A
Question
An attacker has discovered a vulnerable computer with the IP address 192.168.201.10. What tool might the attacker use to determine whether there are other vulnerable computers on the network, and what command would the attacker use? 2. What Nmap option would you use if you wanted to perform a TCP port scan? 3. How would you use Nmap to perform a TCP port scan on a computer with the IP address 192.168.220.101? 4. At the command line, type nmap. What option can you use to perform a UDP port scan? A TCP SYN stealth port scan? 5· Look at the following six packets captured. What is the IP address of the scanning machine? What is the IP address of the machine that was found? Destination Prot Info ARP Who has 172.16.201.997 No. Time 99 18.557275172.16.201.101 Broadcast Tell 172.16.201.101 100 18.557603 172.16.201.101 Broadcast Tell 172.16.201.101 Source ARP Who has 172.16.201.100? 101 18.560688 173.16.201.101 172.16.201.102 ICHP Echo (ping) request 102 18.560994 172.16.201.101 172.16.201.102 TCP 54631 http [ACK) Seq-0 Ack 0 Win-4096 Len-0 103 18.561293 172.16.201.101 Broadcast Tell 172.16.201.101 104 18.561642 172.16.201.101 Broadcast Tell 172.16.201.101 ARP kho has 172.16.201.103 ARP Who has 172.16.201.104? 6. Based on the following information, what server software is on the target machine, and what is the version number of the server program? 220 win2kserv Microsoft ESNTP MAIL Service, Version: .0.2172.1 ready at Sat 25 Sep 2004 18:07:58-0400 7. Based on the following information, what server software is on the target machine, and what is the version number of the server program? 220 win2kserv Microsoft FTP Service (Version 5.0) 8. Based on the following informution, what server software is on the target machine, and wha is the version number of the server program? HTTP/1.1 400 Bad Request Server: Microsoft-IIS/5.0 Date: Sat, 25 Sep 2004 22:11:11 GMT Content-Type: text/html Content-Length: 87 9. Based on the following information, what server software is on the target machine, and wha is the version number of the server program? Connected to 198.0.1.1 Escape character is ". 220 (vSFTPd 1.2.0) 10. Based on the following information, what server software is on the target machine, and what is the version number of the server program? Connected to 4.0.4.13 Escape character is OK POP3 1inuxserv v2003.83rh server readyExplanation / Answer
Q1) An attacker has discovered a vulnerable computer with the IP address 192.168.201.10. What tool might the attacker use to determine whether there are other vulnerable computers on the network, and what command would the attacker use?
Answer)
When the attacker has discovered a vulnerable computer with the IP address 192.168.201.10, he is going to try to determine whether there are other vulnerable computers on the network. This can be achieved using the Nmap software. For detecting the vulnerable machines in the computer in a network the process is of enumerating the network to determine what machines are attached to the network and their state. A tool which has many such features to scan the network and create a representational graphic to identify the devices and their open ports. After that a vulnerability scanner can be used to test if the systems have any vulnerabilities. Then by using these vulnerabilities the attacker might use and compromise the systems.
Nmap is a free tool used for Security Scan, Port Scan, & Network Exploration. So we can scan the network by using the Nmap. The attacker is going to use the Nmap to scan the network looking for computers on the network. The command that the attacker is going to use for scanning in the Nmap is :
nmap –sP 192.168.201.*
-sP is a ping scan option which means to scan every host address on the 192.168.201 network.
Q2) What Nmap option would you use if you wanted to perform a TCP port scan?
Answer)
To perform a TCP port scan we would use the following command in Nmap:
nmap –sT 192.168.201.10
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.