Perform a scan of your routers exterior using shieldsup

Assignment Help Computer Networking
Reference no: EM131168065

Perform a Port Scan

One way of assessing the potential vulnerability of a device, or series of devices, is to perform a scan of all the TCP and UDP ports on each device and analyzing the responses. Many common attacks start with doing port scans of remote systems to see if ports, with known vulnerabilities, are reachable and responding. Historically, a scan reported whether a port responded normally (OPEN), rejected the connection (CLOSED), and was silent if there was no answer. With more aggressive malware appearing, the practice arose of distinguishing this last state explicitly. Port scans now return one of the following responses:

• OPEN
• CLOSED (responds but with a rejection)
• STEALTHED (no response at all)

Firewalls or access controls, along the entire path from probe source to target, can affect the response. These access controls include enterprise firewalls, LAN firewalls, and software host-based firewalls; as well as the device configuration as to what services are running; and on what port. Many services like sshd or httpd can be configured to answer on any IP port not already in use.

Open a command window and enter the command NETSTAT -A -P TCP, which will list all the TCP ports on your computer that have processes connected to them (and whether there is any connection currently active on them). Notice that, although only one application can use a given port, more than one session or instance of that application can share it. This ambiguity is resolved by basing the state of each on the originating port as well as the destination. NETSTAT /?will show you other arguments, like -b, which lists the process name associated with each.

• Identify the services using all of the active ports. Keep a transcript of the result, both the scan and your interpretation of it.

The following is an example of netstat results on a Windows XP workstation:

C:Documents and Settingsmyob>netstat -a -n -p TCP Active Connections

Active ConnectionsDownload and install Nmap from https://nmap.org. Perform a port scan of your own computer using the command nmap "sT "p1-1056 <the address of your computer, for example 192.168.1.42>. This will do a scan attempting only TCP Connect probes on ports 1-1056. Whether you use the Zenmap GUI or command line, you will be able to save a transcript of the results. Include this transcript in your report.

• Compare the results of the Nmap scan with the netstat listing. What differences do you see? Nmap is only showing you what ports are responding (look at the documentation for Nmap for arguments that will try to identify what the software is on the responding port), but netstat is showing you connections and listening processes. Of the information they have in common, what differences are there?

Perform a scan of your router's exterior using ShieldsUp! at https://www.grc.com/ (scroll down to the link or use the pull-down Services button). This will scan the first 1056 TCP ports on your system. What system is responding to ShieldsUp! Is this the same for all cases? Describe specific scenarios with an intervening NAT router. Compare the results of this scan with the previous scans you did. Are the results the same? Why or why not? If they are different, explain what produced the difference.

Repeat the first two steps specifying UDP instead of TCP:

NETSTAT -A -P UDP

nmap -sU -p1-1056 <the address of your computer, for example 192.168.1.42>

• Make a note of any differences. Explain what is happening.
• Explain the differences (in what your results are) and how they come to be.

Attachment:- Perform-a-Port-Scan.rar

Reference no: EM131168065

Questions Cloud

How your personality type influence your job performance : Based on the results of your assessment, what do you see as your strengths and weaknesses? How might your personality type influence your job performance
Determine which training methodology you would use : Determine which training methodology (i.e., live training, online, reading, etc.) you would use to deliver the training. Provide a rationale for your response
Why recruiters focus so much on finding leads : In a 250-300 word response, discuss why communication skills are important to organizational success and why recruiters focus so much on finding leads with good communication skills
Proportion of female managers : A company wishes to test whether the proportion of female managers is the same as the proportion of male managers. The following table provides data for a sample of employees.
Perform a scan of your routers exterior using shieldsup : Perform a scan of your router's exterior using ShieldsUp! at http://www.grc.com/ (scroll down to the link or use the pull-down Services button).
Under a gaussian curve : If the area under a Gaussian curve is 1, then how can it be concluded that μ ± 1σ = 68.3 %, μ ± 2σ = 95.5%?. The formula for relative standard deviation is s/x * 100% where s= standard deviation
Graph the demand curve for carrot cake : Graph the demand curve for carrot cake.  Does the demand curve have a positive or negative slope?  Why? How many slices will Taylor sell at $26.24?  How many at $19.13
State the null and alternate hypothesis : 1) State the null and alternate hypothesis. 2) Calculate P, then determine whether the data provide sufficient evidence to conclude that the mean mass of the birds in the area surrounding the feeder is greater than the mean mass of the general po..
Hypothesis test for a population proportion : Suppose are running a study/poll about the probability of a true negative on a test for a certain cancer. You randomly sample 140 people and find that 70 of them match the condition you are testing.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explaining users a cell can support blocking rate

Find out how many users a cell can support for a 5% call---blocking rate. Assume that each user produces 35mE of load in the busy hour.

  Company-s interpretation of requirement of system

You have taken job with a software user who has contracted previous employer to develop a system for them. You discover that your company's interpretation of requirements is different from interpretation.

  Describe the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface and explain the elements and capabilities of a fault, configuration, accounting, performance, and security server

  Kind of networking hardware used-dsl for internet connection

Most homeowners select to install a DSL for Internet connection what kind of networking hardware would you suggest?

  You are the network engineer contracted to established a

you are the network engineer contracted to established a wan connectivity between two office locations for a local

  Discuss why packet switched networks are used

Discuss why packet switched networks are used for data communication instead of circuit switched - Design the sub blocks and give the slash notation for each sub block.

  Input is control signal to represent four-bit binary number

When k=0, m=n+1, when k=1, m=n+2. Suppose that input for which m>1111 will never happen. The input variable will available from switches.

  The data encryption standard des is a symmetric-key

the data encryption standard des is a symmetric-key algorithm for the encryption of electronic data which you

  What is the maximum number of hosts it can handle

A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle - What are the values of the header length, total length, identification, flags, and fragment offset fields for all three fragment header..

  Describe the use of network management

Explain how the components of an information technology system interrelate in an organizational context. Describe the use of network management, Web, wireless, and mobility technologies.

  What are the pitfalls of networking

By now, we should all know the "benefits" of networking from a technological sense (being more efficient, productive, etc.). However, based on your experience, what are the pitfalls of networking?

  Analyze the following data and identify the red x pink x

analyze the following data and identify the red x pink x and pale x for the component search. the parts were

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd