1 On your local computer, create the lab deliverable files. 2. Review the Lab As
ID: 3918141 • Letter: 1
Question
1 On your local computer, create the lab deliverable files. 2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps. . Review the Lab 5 Nmap Scan Report that accompanies this lab. 4 In your Lab Report file, using the Lab 5 Nmap Scan Report, answer the following What are the date and timestamp of the Nmap host scan? What is the total number of loaded scripts for scanning? .A synchronize packet (SYN) stealth scan discovers all open ports on the targeted host. How many ports are open on the targeted host for the SYN stealth scan at 13:36? Identify hosts, operating systems, services, applications, and open ports on devices from the Zenmap GUI (Nmap) scan report. . Why Nmap Became Popular Nmap started more than 15 years ago as a simple, command-line tool. lts one purpose to send crafted packets to a targeted Intemet Protocol (IP) address to determine what ports are listening for connections. Knowing what speafic ports are listening, the Nmap operator can infer what services are running For example, Transmission Control Protocol (TCP) port 80 is open and listening, it's a safe assumption the target machine is a Web server, running the Hypertext Transfer Protocol (HTTP) service on port 80. Other popular ports such as 21, 25, 137, and 161 mean the services File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP Network Basic Input/Output System (NetBIOS), and Simple Network Management Protocol (SNMP) are listening, respectively. This made Nmap very popular with administrators who could then monitor and veritly their systems services Nmap also became very popular as an easy tool for reconnaissance. With malicious intent, a person armed with knowing what services were running could research what vulnerablities to exploit. The fast scanning Nmap made ocating the recently discovered exploits caled zero-day exploits very efficient.
Explanation / Answer
(1) Nmap is easy tool for reconnaissance,with malicious intent. it is used for the fast scanning Nmap locting the recently discovered exploits called zero-day exploits very efficients.
in 15 years ago , Nmap have multiple feature in several times.
Nessus is a powerfull vulnerablity scanner, with a fast growing list of available plug-ins.AS you see from the lab sample reporting can be detailed and customized.
(4) It totally depends upon situation ,but generally 2 or 3 use ip address use for host .
(6)Any public discussion of vulnerability information may help a hacker. However, there are several reasons why the benefits of CVE outweigh its risks:
CVE is restricted to publicly known vulnerabilities and exposures.
For a variety of reasons, sharing information is more difficult within the cybersecurity community than it is for hackers.
It takes much more work for an organization to protect its networks and fix all possible holes than it takes for a hacker to find a single vulnerability, exploit it, and compromise the network.
Community opinion supports sharing information, reflected in the CVE Board and CVE Numbering Authorities (CNAs) as both include key organizations in cybersecurity.
(7)CVE is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures. The goal of CVE is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services) with these definitions. CVE Entries are comprised of an identification number, a description, and at least one public reference.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.