Lab 6 - Network Security - port scanner

Nmap port scanner

Pre-assignment: Nmap ("Network Mapper") [ http://www.insecure.org/nmap/ ]  is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and both console and graphical versions are available. Nmap is free software, available with full source code under the terms of the GNU GPL.

Nmap is available for Windows and Linux.

 Before installing Nmap for Windows, you must first install WinCap (from http://winpcap.polito.it/) to allow for the capture of network packets. This can be done independently or by installing includes nmapwin_1.3.1.exe (http://download.insecure.org/nmap/dist/nmapwin_1.3.1.exe ),  which includes Nmap and Winpcap.

Assignment:

Post-assignment:

1)      Submit answers to the following questions based on the reports you generated.

a)      Which host had the highest number of vulnerabilities?

b)      least number of vulnerabilities?

c)      What operating systems are running on the computers?

d)      List several services running on each computer?

e)      Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize the risk from the vulnerability.