Lab1
Scanning System and Network Resources Using Advanced IP Scanner
Lab Scenario
111 this day and age, where attackers are able to wait for a single chance to attack an organization to disable it, it becomes very important to perform vulnerability scanning to find the flaws and vulnerabilities in a network and patch them before an attacker intrudes into the network. The goal of running a vulnerability scanner is to identify devices on your network that are open to known vulnerabilities.
Lab Objectives
The objective o f this lab is to help students perform a local network scan and discover all the resources 011 die network.
You need to:
■ Perform a system and network scan
■ Enumerate user accounts
■ Execute remote penetration
■ Gather information about local network computers
Lab Environment
111 die lab, you need:
■ Advanced IP Scanner located at Z:\\CEHv8 Module 03 Scanning Networks\Scanning Tools Advanced IP Scanner
■ You can also download the latest version of Advanced IP Scanner from the link http://www.advanced-ip-scanner.com
■ If you decide to download the la te s t version, then screenshots shown in the lab might differ
■ A computer running Windows 8 as die attacker (host machine)
■ Another computer running Windows server 2008 as die victim (virtual machine)
■ A web browser widi Internet a c c e s s
■ Double-click ipscan20.msi and follow die wizard-driven installation steps to install Advanced IP Scanner
■ Administrative privileges to run diis tool
Lab Duration
Time: 20 Minutes
Overview o f N etw ork Scanning
Network scanning is performed to collect information about live systems, open ports, and network vulnerabilities. Gathered information is helpful in determining threats and vulnerabilities 111 a network and to know whether there are any suspicious or unauthorized IP connections, which may enable data theft and cause damage to resources.
Lab Tasks
1. Go to Start by hovering die mouse cursor in die lower-left corner of die desktop
![]() |
FIGURE 1.1: Windows 8 - Desktop view |
2. Click Advanced IP Scanner from die Start menu in die attacker machine (Windows 8).
![]() |
FIGURE 12. Windows 8 - Apps |
![]() |
FIGURE 13: The Advanced IP Scanner main window |
4. Now launch die Windows Server 2008 virtual machine (victim’s machine).
![]() |
FIGURE 1.4: The victim machine Windows server 2008 |
6. Click die Scan button to start die scan.
7. Advanced IP Scanner scans all die IP addresses within die range and displays the scan results after completion.
![]() |
FIGURE 1.6: The Advanced IP Scanner main window after scanning |
9. Right-click any o f die detected IP addresses. It will list Wake-On-LAN. Shut down, and Abort Shut down
![]() |
FIGURE 1.7: The Advanced IP Scanner main window with Alive Host list |
11. You can forcefully Shutdown, Reboot, and Abort Shutdown die selected victim machine/IP address
![]() |
FIGURE 1.8: The Advanced IP Scanner Computer properties window |
13. You can also try Angry IP scanner located at D:\CEH-Tools\CEHv8 Module 03 Scanning Networks\Ping Sweep Tools\Angry IP Scanner It also scans the network for machines and ports.
Lab Analysis
Document all die IP addresses, open ports and dieii running applications, and protocols discovered during die lab.
Questions
1. Examine and evaluate the IP addresses and range of IP addresses.
Không có nhận xét nào:
Đăng nhận xét