Perform a scan of your routers exterior using shieldsup

Assignment Help Computer Networking
Reference no: EM131168065

Perform a Port Scan

One way of assessing the potential vulnerability of a device, or series of devices, is to perform a scan of all the TCP and UDP ports on each device and analyzing the responses. Many common attacks start with doing port scans of remote systems to see if ports, with known vulnerabilities, are reachable and responding. Historically, a scan reported whether a port responded normally (OPEN), rejected the connection (CLOSED), and was silent if there was no answer. With more aggressive malware appearing, the practice arose of distinguishing this last state explicitly. Port scans now return one of the following responses:

• OPEN
• CLOSED (responds but with a rejection)
• STEALTHED (no response at all)

Firewalls or access controls, along the entire path from probe source to target, can affect the response. These access controls include enterprise firewalls, LAN firewalls, and software host-based firewalls; as well as the device configuration as to what services are running; and on what port. Many services like sshd or httpd can be configured to answer on any IP port not already in use.

Open a command window and enter the command NETSTAT -A -P TCP, which will list all the TCP ports on your computer that have processes connected to them (and whether there is any connection currently active on them). Notice that, although only one application can use a given port, more than one session or instance of that application can share it. This ambiguity is resolved by basing the state of each on the originating port as well as the destination. NETSTAT /?will show you other arguments, like -b, which lists the process name associated with each.

• Identify the services using all of the active ports. Keep a transcript of the result, both the scan and your interpretation of it.

The following is an example of netstat results on a Windows XP workstation:

C:Documents and Settingsmyob>netstat -a -n -p TCP Active Connections

Active ConnectionsDownload and install Nmap from https://nmap.org. Perform a port scan of your own computer using the command nmap "sT "p1-1056 <the address of your computer, for example 192.168.1.42>. This will do a scan attempting only TCP Connect probes on ports 1-1056. Whether you use the Zenmap GUI or command line, you will be able to save a transcript of the results. Include this transcript in your report.

• Compare the results of the Nmap scan with the netstat listing. What differences do you see? Nmap is only showing you what ports are responding (look at the documentation for Nmap for arguments that will try to identify what the software is on the responding port), but netstat is showing you connections and listening processes. Of the information they have in common, what differences are there?

Perform a scan of your router's exterior using ShieldsUp! at https://www.grc.com/ (scroll down to the link or use the pull-down Services button). This will scan the first 1056 TCP ports on your system. What system is responding to ShieldsUp! Is this the same for all cases? Describe specific scenarios with an intervening NAT router. Compare the results of this scan with the previous scans you did. Are the results the same? Why or why not? If they are different, explain what produced the difference.

Repeat the first two steps specifying UDP instead of TCP:

NETSTAT -A -P UDP

nmap -sU -p1-1056 <the address of your computer, for example 192.168.1.42>

• Make a note of any differences. Explain what is happening.
• Explain the differences (in what your results are) and how they come to be.

Attachment:- Perform-a-Port-Scan.rar

Reference no: EM131168065

Questions Cloud

How your personality type influence your job performance : Based on the results of your assessment, what do you see as your strengths and weaknesses? How might your personality type influence your job performance
Determine which training methodology you would use : Determine which training methodology (i.e., live training, online, reading, etc.) you would use to deliver the training. Provide a rationale for your response
Why recruiters focus so much on finding leads : In a 250-300 word response, discuss why communication skills are important to organizational success and why recruiters focus so much on finding leads with good communication skills
Proportion of female managers : A company wishes to test whether the proportion of female managers is the same as the proportion of male managers. The following table provides data for a sample of employees.
Perform a scan of your routers exterior using shieldsup : Perform a scan of your router's exterior using ShieldsUp! at http://www.grc.com/ (scroll down to the link or use the pull-down Services button).
Under a gaussian curve : If the area under a Gaussian curve is 1, then how can it be concluded that μ ± 1σ = 68.3 %, μ ± 2σ = 95.5%?. The formula for relative standard deviation is s/x * 100% where s= standard deviation
Graph the demand curve for carrot cake : Graph the demand curve for carrot cake.  Does the demand curve have a positive or negative slope?  Why? How many slices will Taylor sell at $26.24?  How many at $19.13
State the null and alternate hypothesis : 1) State the null and alternate hypothesis. 2) Calculate P, then determine whether the data provide sufficient evidence to conclude that the mean mass of the birds in the area surrounding the feeder is greater than the mean mass of the general po..
Hypothesis test for a population proportion : Suppose are running a study/poll about the probability of a true negative on a test for a certain cancer. You randomly sample 140 people and find that 70 of them match the condition you are testing.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd