Lab 5 - Network Security - port scanner and network protocol analyzer
Part A: Nmap port scanner
Pre-assignment:
Nmap ("Network Mapper") [ http://www.insecure.org/nmap/ ] is an open source
utility for network exploration or security auditing. It was designed to
rapidly scan large networks, although it works fine against single hosts. Nmap
uses raw IP packets in novel ways to determine what hosts are available on the
network, what services (ports) they are offering, what operating system (and OS
version) they are running, what type of packet filters/firewalls are in use,
and dozens of other characteristics. Nmap runs on most types of computers, and
both console and graphical versions are available. Nmap is free software,
available with full source code under the terms of the GNU GPL.
Nmap is available for
Windows (http://www.nmapwin.org/ ) and Linux.
Before installing Nmap for Windows, you must first install WinCap (from http://winpcap.polito.it/) to allow for the capture of network packets. This can be done independently or by installing includes nmapwin_1.3.1.exe (http://download.insecure.org/nmap/dist/nmapwin_1.3.1.exe), which includes Nmap and Winpcap.
Assignment:
Post-assignment:
Part B: Ethereal network protocol analyzer
Pre-assignment:
Ethereal is a free network protocol analyzer for Unix and Windows. It allows
you to examine data from a live network or from a capture file on disk. You can
interactively browse the capture data, viewing summary and detail information
for each packet. Ethereal has several powerful features, including a rich
display filter language and the ability to view the reconstructed stream of a
TCP session.
Ethereal is available for Windows and Linux (http://www.ethereal.com/download.html).
Before installing Ethereal for Windows, you must first install WinCap (from http://winpcap.polito.it/) to allow for the capture of network packets.
Assignment:
Post-assignment: