Sandip - PR 1 2 Cs
Sandip - PR 1 2 Cs
PRACTICAL 1
AIM: Perform Port Scanning using Nmap (Network Mapper)
“Network Mapper” though not necessarily a pen-testing tool, it is a must-have for the ethical
hackers. This is a very popular tool that predominantly aids in understanding the
characteristics of any target network. The characteristics can include: host, services, OS, packet
filters/firewalls etc. It works on most of the environments and is open sourced.
• Detect the software and the version to the respective port (service discovery)
• Detect the operating system, hardware address, and the software version
[1] If you want to scan a single system, then you can use a
simple command
# nmap127.0.0.1
[4] Get the information about the MAC addresses of all the
machines in your network
nmap -sP127.0.0.1-254
Description:
-sP instructs nmap tool to perform a ping scan to determine if the target host is up;
By default, the -sP option causes nmap to send an ICMP echo request and a TCP packet to
port 80.
Using either ping or nmap, you can find out what machines are connected to your LAN.
PRACTICAL 2
AIM: Analyze the Network Traffic using Wireshark.
(Network Sniffer)
A packet sniffer, sometimes referred toas a network monitor or network analyzer, can be used
by network or system administrator to monitor and troubleshoot network traffic. Using the
information captured by the packet sniffer an administrator can identify erroneous packets
and use the data to pinpoint bottlenecks and help maintain efficient network data
transmission.
In its simple form a packet sniffer simply captures all of the packets of data that pass through
a given network interface. By placing a packet sniffer on a networking promiscuous mode, a
Malicious intruder can capture and analyze all of the network traffic.
This is basically a network protocol analyzer –popular for providing the minutest details about
your network protocols, packet information, decryption etc. It can be used on Windows, Linux,
OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via
this tool can be viewed through a GUI, or the TTY-mode T Shark utility. You can get your own
free version of the tool from here.
2. Select interface: Goto capture option in menu bar and select interface
3. Start Capturing