Computer Science Homework Help

Estrella Mountain Community College Nmap Scan PEN Testing Report

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

An attacker’s goal is to increase information gathered in the passive recon phase to expand their knowledge of a network. To do this they will turn to active recon scanning of the network. NMap is one tool that an attacker will use to identify hosts on a network and the services that are running on them, enabling the attacker to discover vulnerabilities on these hosts and exploit them.

Using GCU Approved Virtualization Solution and NMap (Network Scanning Tool) available in Kali Linux, perform various network scans on two or more virtual machine targets. Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry standard “Writing a Penetration Testing Report,” for examples of PEN Testing Reports. At a minimum (go above and beyond the minimum; the attacker will!), perform the following network enumerations, (footprinting) using NMap:

  1. Scan for all hosts in a range of IP addresses.
  2. Perform OS fingerprinting of discovered hosts.
  3. Identify open ports and services running on these hosts.
  4. Identify the versions of these discovered services.

Append this assignment to the PEN Testing Report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan).