0% found this document useful (0 votes)
68 views23 pages

Sandip - PR 1 2 Cs

The document is a lab manual for a student named Sandip Mourya enrolled in the Cyber Security batch of the Computer Engineering department. It details two practical exercises, the first on using Nmap to perform port scanning and the second on using Wireshark to analyze network traffic. Nmap is used to discover open ports, operating systems, and vulnerabilities on hosts. Wireshark is installed and used to capture and analyze network packets to troubleshoot network issues.

Uploaded by

Sandip Mourya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views23 pages

Sandip - PR 1 2 Cs

The document is a lab manual for a student named Sandip Mourya enrolled in the Cyber Security batch of the Computer Engineering department. It details two practical exercises, the first on using Nmap to perform port scanning and the second on using Wireshark to analyze network traffic. Nmap is used to discover open ports, operating systems, and vulnerabilities on hosts. Wireshark is installed and used to capture and analyze network packets to troubleshoot network issues.

Uploaded by

Sandip Mourya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Name: Sandip Mourya

Enrollment No: 190180107035


Batch: Cyber Security
Department: Computer Engineering
Practical 1 and 2

Cyber Security [3150714]


Lab Manual
SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

PRACTICAL 1
AIM: Perform Port Scanning using Nmap (Network Mapper)

“Network Mapper” though not necessarily a pen-testing tool, it is a must-have for the ethical
hackers. This is a very popular tool that predominantly aids in understanding the
characteristics of any target network. The characteristics can include: host, services, OS, packet
filters/firewalls etc. It works on most of the environments and is open sourced.

Port Scanning Using Nmap


Network Mapped (Nmap) is a network scanning and host detection tool that is very useful
during several steps of penetration testing. Nmap is not limited to merely gathering
information and enumeration, but it is also powerful utility that can be used as a vulnerability
detector or a security scanner. So Nmap is a multipurpose tool, and it can be run on many
different operating systems including Windows, Linux, BSD, and Mac.

Nmap is a very powerful utility that can be used to:

• Detect the live host on the network (host discovery)

• Detect the open ports on the host (port discovery or enumeration)

• Detect the software and the version to the respective port (service discovery)

• Detect the operating system, hardware address, and the software version

• Detect the vulnerability and security holes (Nmap scripts)

BATCH: CYBER SECURITY Page 1


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

❖ How to Use Nmap Effectively

[1] If you want to scan a single system, then you can use a
simple command
# nmap127.0.0.1

BATCH: CYBER SECURITY Page 2


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 3


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

[2]Finding live hosts in your network


nmap-sn 172.168.3.0/24

BATCH: CYBER SECURITY Page 4


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 5


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 6


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

[3] Get the information about the weakest host in your


network
nmap-v-O172.168.1.1-255

BATCH: CYBER SECURITY Page 7


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 8


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

[4] Get the information about the MAC addresses of all the
machines in your network
nmap -sP127.0.0.1-254
Description:

-sP instructs nmap tool to perform a ping scan to determine if the target host is up;

No port scanning or operating system detection is performed.

By default, the -sP option causes nmap to send an ICMP echo request and a TCP packet to
port 80.

BATCH: CYBER SECURITY Page 9


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

Using either ping or nmap, you can find out what machines are connected to your LAN.

BATCH: CYBER SECURITY Page 10


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

[5] Get the operating systems of the hosts in your network.


Also, try to verify the accuracy of the results.
nmap-T4-A-v172.168.3.*

BATCH: CYBER SECURITY Page 11


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 12


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

PRACTICAL 2
AIM: Analyze the Network Traffic using Wireshark.
(Network Sniffer)

BATCH: CYBER SECURITY Page 13


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

A packet sniffer, sometimes referred toas a network monitor or network analyzer, can be used
by network or system administrator to monitor and troubleshoot network traffic. Using the
information captured by the packet sniffer an administrator can identify erroneous packets
and use the data to pinpoint bottlenecks and help maintain efficient network data
transmission.

In its simple form a packet sniffer simply captures all of the packets of data that pass through
a given network interface. By placing a packet sniffer on a networking promiscuous mode, a
Malicious intruder can capture and analyze all of the network traffic.

This is basically a network protocol analyzer –popular for providing the minutest details about
your network protocols, packet information, decryption etc. It can be used on Windows, Linux,
OS X, Solaris, FreeBSD, NetBSD, and many other systems. The information that is retrieved via
this tool can be viewed through a GUI, or the TTY-mode T Shark utility. You can get your own
free version of the tool from here.

Download and install wireshark network analyzer.

Steps to capture traffic:

1. Open Wireshark network analyzer

BATCH: CYBER SECURITY Page 14


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

2. Select interface: Goto capture option in menu bar and select interface

BATCH: CYBER SECURITY Page 15


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

3. Start Capturing

BATCH: CYBER SECURITY Page 16


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

4. Analyzing the network traffic

BATCH: CYBER SECURITY Page 17


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 18


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 19


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 20


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 21


SANDIP MOURYA 190180107035 COMPUTER ENGINEERING

BATCH: CYBER SECURITY Page 22

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy