diff options
Diffstat (limited to 'netsec-assignment3-S4498062/exercise3')
-rw-r--r-- | netsec-assignment3-S4498062/exercise3/exercise3a | 20 | ||||
-rw-r--r-- | netsec-assignment3-S4498062/exercise3/exercise3b | 22 | ||||
-rw-r--r-- | netsec-assignment3-S4498062/exercise3/exercise3c | 54 | ||||
-rw-r--r-- | netsec-assignment3-S4498062/exercise3/exercise3d | 16 |
4 files changed, 112 insertions, 0 deletions
diff --git a/netsec-assignment3-S4498062/exercise3/exercise3a b/netsec-assignment3-S4498062/exercise3/exercise3a new file mode 100644 index 0000000..b7d911a --- /dev/null +++ b/netsec-assignment3-S4498062/exercise3/exercise3a @@ -0,0 +1,20 @@ +Note: I didn't notice in time I needed the homework network for this, so can't give any results. The output is example output from another network, at my home. + +# nmap -sP 192.168.84.1/24 + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:29 CEST +Nmap scan report for ZyXEL.Home (192.168.84.1) +Host is up (0.0034s latency). +MAC Address: 4C:9E:FF:C5:63:E1 (ZyXEL Communications) +Nmap scan report for 192.168.84.66 +Host is up (0.056s latency). +MAC Address: A0:E4:53:44:EB:DA (Sony Mobile Communications AB) +Nmap scan report for 192.168.84.68 +Host is up (0.0093s latency). +MAC Address: 94:3B:B1:28:D8:6D (Kaonmedia) +Nmap scan report for 192.168.84.70 +Host is up (0.0097s latency). +MAC Address: B8:27:EB:22:C0:0E (Raspberry Pi Foundation) +Nmap scan report for 192.168.84.75 +Host is up. +Nmap done: 256 IP addresses (5 hosts up) scanned in 1.76 seconds diff --git a/netsec-assignment3-S4498062/exercise3/exercise3b b/netsec-assignment3-S4498062/exercise3/exercise3b new file mode 100644 index 0000000..a06f0ca --- /dev/null +++ b/netsec-assignment3-S4498062/exercise3/exercise3b @@ -0,0 +1,22 @@ +# nmap -O 192.168.84.10 # (for example) + +Example output: + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:30 CEST +Nmap scan report for 192.168.84.10 +Host is up (0.000078s latency). +Not shown: 997 closed ports +PORT STATE SERVICE +25/tcp open http +80/tcp open http +111/tcp open rpcbind +443/tcp open https +Device type: general purpose +Running: Linux 3.X +OS CPE: cpe:/o:linux:linux_kernel:3 +OS details: Linux 3.7 - 3.15 +Network Distance: 0 hops + +OS detection performed. Please report any incorrect results at http://nmap.org/submit/ . +Nmap done: 1 IP address (1 host up) scanned in 92.05 seconds + diff --git a/netsec-assignment3-S4498062/exercise3/exercise3c b/netsec-assignment3-S4498062/exercise3/exercise3c new file mode 100644 index 0000000..49ba174 --- /dev/null +++ b/netsec-assignment3-S4498062/exercise3/exercise3c @@ -0,0 +1,54 @@ +All outputs are example outputs, generated on my own local network (mapping a raspberry pi with Raspbian; Linux pi 3.18.0-trunk-rpi #1 PREEMPT Debian 3.18.5-1~exp1+rpi19 (2015-08-08) armv6l GNU/Linux). See exercise3a. + +# nmap 192.168.84.10 # (for example); basic 1000 TCP ports scan + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:36 CEST +Nmap scan report for 192.168.84.75 +Host is up (0.0000040s latency). +Not shown: 997 closed ports +PORT STATE SERVICE +80/tcp open http +111/tcp open rpcbind +443/tcp open https +# nmap -sS 192.168.84.10 # TCP SYN scan; only check handshake (doesn't need that many connections) + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:44 CEST +Nmap scan report for 192.168.84.75 +Host is up (0.000054s latency). +Not shown: 997 closed ports +PORT STATE SERVICE +80/tcp open http +111/tcp open rpcbind +443/tcp open https + +Nmap done: 1 IP address (1 host up) scanned in 89.55 seconds +# nmap -sT 192.168.84.10 # TCP connect scan; if TCP SYN doesn't work + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST +Nmap scan report for 192.168.84.75 +Host is up (0.00016s latency). +Not shown: 997 closed ports +PORT STATE SERVICE +80/tcp open http +111/tcp open rpcbind +443/tcp open https + +Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds +# nmap -sU 192.168.84.10 # UDP + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:46 CEST +Nmap scan report for 192.168.84.75 +Host is up (0.000054s latency). +Not shown: 995 closed ports +PORT STATE SERVICE +68/udp open|filtered dhcpc +111/udp open rpcbind +631/udp open|filtered ipp +1900/udp open|filtered upnp +5353/udp open|filtered zeroconf + +Nmap done: 1 IP address (1 host up) scanned in 187.41 seconds + + +I would use others from the manual if these fail. + diff --git a/netsec-assignment3-S4498062/exercise3/exercise3d b/netsec-assignment3-S4498062/exercise3/exercise3d new file mode 100644 index 0000000..a0f352a --- /dev/null +++ b/netsec-assignment3-S4498062/exercise3/exercise3d @@ -0,0 +1,16 @@ +# nmap -sV 192.168.84.10 + +Example output: + +Starting Nmap 6.47 ( http://nmap.org ) at 2015-09-24 22:40 CEST +Nmap scan report for 192.168.84.10 +Host is up (0.0000090s latency). +Not shown: 996 closed ports +PORT STATE SERVICE VERSION +25/tcp open http nginx 1.6.2 +80/tcp open http nginx 1.6.2 +111/tcp open rpcbind 2-4 (RPC #100000) +443/tcp open http nginx 1.6.2 + +Here, 25 is a non-standard port for HTTP. Normally, 25 is used for SMTP. + |