Order Now

Laboratory Exercise – Reconnaissance Lab Exercise.

Laboratory Exercise – Reconnaissance Lab Exercise.

 

You should use the Cyber Basics (2020) exercise environment for this lab.

 

  1. Overview

 

This lab will demonstrate the use of the route command to obtain network information and the use of nmap and Zenmap to map a network.

 

  1. Resources required

 

This lab uses the Cyber Range Cyber Basics (2020) environment.

                                               

  1. Initial Setup

 

Students should already have access to the Cyber Range Cyber Basics (2020) environment. They should use the username student and the password student to access the environment.

 

  1. Reporting: Create a professional document that describes what you did, what the results were (MUST INCLUDE SNIPS OF PROOF), and what you learned from this Lab.
  2. Tasks

 

Task 1: Logon to Kali Linux: Cyber Basics machine

 

Start the Cyber Basics (2020) Environment and logon with the username student and the password student, if needed.

 

 

 

Task 2: Open a Terminal

 

Once Kali Linux starts, click the Terminal icon in the bottom middle of the desktop to open a terminal window.

 

 

Task 3: Run the route command

 

In the Terminal window, use the route command to locate the network ID of your network. The network ID will be located under the word default as in the example below. Your network ID may be different than the network ID in the example.

 

 

Document your network ID _____________________.

 

Task 4: Run the nmap command

 

In the Terminal window, use the nmap command to scan the network for hosts. This is also known as network reconnaissance. All network use as /20 for the CIDR. CIDR stands for Classes Inter Domain Routing and represents the number of bits in the subnet mask.  In the case of /20 the network mask is 255.255.240 which is 20 bits.  So, the command to type at the prompt would be as follows where network_id is the IP address you found from Task 3 and /CIDR is /20 as we just explained:

 

         nmap network_id/CIDR

 

 

[NOTE: In the sample above, the target network is: 10.1.48.0/20. The target network in your network may be different.]

 

The output from the nmap will show the IP address of the hosts scanned and any ports that are open on the host. By default, nmap scans the 1000 most common ports.

 

 

[NOTE: In the sample above, the target network is: 10.1.48.0/20. The target network in your network may be different.]

 

Document each IP address found and all open ports for each host.

 

Your nmap scan should locate at least 4 hosts.

 

 

Task 5: Scan the network with Zenmap

 

In a Terminal window, start Zenmap with the sudo command and the & sign executing  the following command:

 

         sudo zenmap &

 

The sudo command runs Zenmap with root privileges and the & sign runs it as a background process.  This allows you to have access to the terminal again once the program starts.

 

You will need to provide the network ID and CIDR for the Target, select Regular scan for the Profile, then click Scan.

 

 

[NOTE: In the sample above, the target network is: 10.1.48.0/20. The target network in your network may be different.]

 

Compare the results of the Zenmap scan to the results of the nmap scan. Were the results the same or different?

 

  1. References

 

Laboratory Exercise – Reconnaissance Lab Exercise.

 

 

 

 

Order Now

Calculate Your Order Price


Price (USD)
$