aboutsummaryrefslogtreecommitdiff
path: root/netsec-assignment3-S4498062/exercise3
diff options
context:
space:
mode:
Diffstat (limited to 'netsec-assignment3-S4498062/exercise3')
-rw-r--r--netsec-assignment3-S4498062/exercise3/exercise3a20
-rw-r--r--netsec-assignment3-S4498062/exercise3/exercise3b22
-rw-r--r--netsec-assignment3-S4498062/exercise3/exercise3c54
-rw-r--r--netsec-assignment3-S4498062/exercise3/exercise3d16
4 files changed, 112 insertions, 0 deletions
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3a b/netsec-assignment3-S4498062/exercise3/exercise3a
new file mode 100644
index 0000000..b7d911a
--- /dev/null
+++ b/netsec-assignment3-S4498062/exercise3/exercise3a
@@ -0,0 +1,20 @@
+Note: I didn't notice in time I needed the homework network for this, so can't give any results. The output is example output from another network, at my home.
+
+# nmap -sP 192.168.84.1/24
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:29 CEST
+Nmap scan report for ZyXEL.Home (192.168.84.1)
+Host is up (0.0034s latency).
+MAC Address: 4C:9E:FF:C5:63:E1 (ZyXEL Communications)
+Nmap scan report for 192.168.84.66
+Host is up (0.056s latency).
+MAC Address: A0:E4:53:44:EB:DA (Sony Mobile Communications AB)
+Nmap scan report for 192.168.84.68
+Host is up (0.0093s latency).
+MAC Address: 94:3B:B1:28:D8:6D (Kaonmedia)
+Nmap scan report for 192.168.84.70
+Host is up (0.0097s latency).
+MAC Address: B8:27:EB:22:C0:0E (Raspberry Pi Foundation)
+Nmap scan report for 192.168.84.75
+Host is up.
+Nmap done: 256 IP addresses (5 hosts up) scanned in 1.76 seconds
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3b b/netsec-assignment3-S4498062/exercise3/exercise3b
new file mode 100644
index 0000000..a06f0ca
--- /dev/null
+++ b/netsec-assignment3-S4498062/exercise3/exercise3b
@@ -0,0 +1,22 @@
+# nmap -O 192.168.84.10 # (for example)
+
+Example output:
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:30 CEST
+Nmap scan report for 192.168.84.10
+Host is up (0.000078s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+25/tcp open http
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+Device type: general purpose
+Running: Linux 3.X
+OS CPE: cpe:/o:linux:linux_kernel:3
+OS details: Linux 3.7 - 3.15
+Network Distance: 0 hops
+
+OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 92.05 seconds
+
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3c b/netsec-assignment3-S4498062/exercise3/exercise3c
new file mode 100644
index 0000000..49ba174
--- /dev/null
+++ b/netsec-assignment3-S4498062/exercise3/exercise3c
@@ -0,0 +1,54 @@
+All outputs are example outputs, generated on my own local network (mapping a raspberry pi with Raspbian; Linux pi 3.18.0-trunk-rpi #1 PREEMPT Debian 3.18.5-1~exp1+rpi19 (2015-08-08) armv6l GNU/Linux). See exercise3a.
+
+# nmap 192.168.84.10 # (for example); basic 1000 TCP ports scan
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:36 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.0000040s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+# nmap -sS 192.168.84.10 # TCP SYN scan; only check handshake (doesn't need that many connections)
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:44 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.000054s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+
+Nmap done: 1 IP address (1 host up) scanned in 89.55 seconds
+# nmap -sT 192.168.84.10 # TCP connect scan; if TCP SYN doesn't work
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.00016s latency).
+Not shown: 997 closed ports
+PORT STATE SERVICE
+80/tcp open http
+111/tcp open rpcbind
+443/tcp open https
+
+Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
+# nmap -sU 192.168.84.10 # UDP
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST
+Nmap scan report for 192.168.84.75
+Host is up (0.000054s latency).
+Not shown: 995 closed ports
+PORT STATE SERVICE
+68/udp open|filtered dhcpc
+111/udp open rpcbind
+631/udp open|filtered ipp
+1900/udp open|filtered upnp
+5353/udp open|filtered zeroconf
+
+Nmap done: 1 IP address (1 host up) scanned in 187.41 seconds
+
+
+I would use others from the manual if these fail.
+
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3d b/netsec-assignment3-S4498062/exercise3/exercise3d
new file mode 100644
index 0000000..a0f352a
--- /dev/null
+++ b/netsec-assignment3-S4498062/exercise3/exercise3d
@@ -0,0 +1,16 @@
+# nmap -sV 192.168.84.10
+
+Example output:
+
+Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:40 CEST
+Nmap scan report for 192.168.84.10
+Host is up (0.0000090s latency).
+Not shown: 996 closed ports
+PORT STATE SERVICE VERSION
+25/tcp open http nginx 1.6.2
+80/tcp open http nginx 1.6.2
+111/tcp open rpcbind 2-4 (RPC #100000)
+443/tcp open http nginx 1.6.2
+
+Here, 25 is a non-standard port for HTTP. Normally, 25 is used for SMTP.
+