Computer Science Homework Help
Estrella Mountain Community College Nmap Scan PEN Testing Report
An attacker’s goal is to increase information gathered in the passive recon phase to expand their knowledge of a network. To do this they will turn to active recon scanning of the network. NMap is one tool that an attacker will use to identify hosts on a network and the services that are running on them, enabling the attacker to discover vulnerabilities on these hosts and exploit them.
Using GCU Approved Virtualization Solution and NMap (Network Scanning Tool) available in Kali Linux, perform various network scans on two or more virtual machine targets. Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry standard “Writing a Penetration Testing Report,” for examples of PEN Testing Reports. At a minimum (go above and beyond the minimum; the attacker will!), perform the following network enumerations, (footprinting) using NMap:
- Scan for all hosts in a range of IP addresses.
- Perform OS fingerprinting of discovered hosts.
- Identify open ports and services running on these hosts.
- Identify the versions of these discovered services.
Append this assignment to the PEN Testing Report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan).