NMAP Network Mapper

Posted: August 27th, 2021

NMAP Network Mapper

Name

Institutional Affiliation

NMAP Network Mapper

Activity 1: Wireshark Capture

Figure 1: Screenshot 1

Activity 2: nmap 192.168.1.11

Figure 2: Screenshot 2:

Wireshark Out

Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 21:34 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.0014s latency). PORT      STATE    SERVICE 1/tcp     open     tcpmux 3/tcp     open     compressnet 4/tcp     open     unknown 6/tcp     open     unknown 7/tcp     open     echo 9/tcp     open     discard 13/tcp    open     daytime 17/tcp    open     qotd 19/tcp    open     chargen 20/tcp    open     ftp-data 21/tcp    open     ftp 22/tcp    open     ssh 23/tcp    open     telnet 24/tcp    open     priv-mail 25/tcp    open     smtp 26/tcp    open     rsftp 30/tcp    open     unknown 32/tcp    open     unknown 33/tcp    open     dsp 37/tcp    open     time 42/tcp    open     nameserver 43/tcp    open     whois 49/tcp    open     tacacs 53/tcp    open     domain 70/tcp    open     gopher 79/tcp    open     finger 80/tcp    open     http 81/tcp    open     hosts2-ns 82/tcp    open     xfer 83/tcp    open     mit-ml-dev 84/tcp    open     ctf 85/tcp    open     mit-ml-dev 88/tcp    open     kerberos-sec 89/tcp    open     su-mit-tg 90/tcp    open     dnsix 99/tcp    filtered metagram 100/tcp   filtered newacct 106/tcp   open     pop3pw 109/tcp   open     pop2 110/tcp   open     pop3 111/tcp   open     rpcbind 113/tcp   open     ident 119/tcp   open     nntp 125/tcp   open     locus-map 135/tcp   open     msrpc 139/tcp   open     netbios-ssn 143/tcp   open     imap 144/tcp   open     news 146/tcp   open     iso-tp0 161/tcp   open     snmp 163/tcp   open     cmip-man 179/tcp   open     bgp 199/tcp   open     smux 211/tcp   open     914c-g 212/tcp   open     anet 222/tcp   open     rsh-spx 254/tcp   open     unknown 255/tcp   open     unknown 256/tcp   open     fw1-secureremote 259/tcp   open     esro-gen 264/tcp   open     bgmp 280/tcp   open     http-mgmt 301/tcp   open     unknown 306/tcp   open     unknown 311/tcp   open     asip-webadmin 340/tcp   open     unknown 366/tcp   open     odmr 389/tcp   open     ldap

Command Prompt Output

C:\Program Files (x86)\Nmap>nmap -Pn 192.168.1.11 Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 21:36 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.0031s latency). Not shown: 770 filtered ports, 54 closed ports PORT   STATE SERVICE 1/tcp     open  tcpmux 7/tcp     open  echo 9/tcp     open  discard 25/tcp    open  smtp 49/tcp    open  tacacs 53/tcp    open  domain 70/tcp    open  gopher 80/tcp    open  http 82/tcp    open  xfer 85/tcp    open  mit-ml-dev 109/tcp   open  pop2 211/tcp   open  914c-g 254/tcp   open  unknown 311/tcp   open  asip-webadmin 389/tcp   open  ldap 407/tcp   open  timbuktu 417/tcp   open  onmux 458/tcp   open  appleqtc 524/tcp   open  ncp 541/tcp   open  uucp-rlogin 545/tcp   open  ekshell 587/tcp   open  submission 593/tcp   open  http-rpc-epmap 617/tcp   open  sco-dtmg

Screenshot 3: Wireshark Results

Screenshot 4: TCP Capture

Q.6. What Does The TCP Flags Show In The Wireshark Capture? Explain Your Answer

The TCP flags as demonstrated under screenshot 3 illustrates what sending the TCP entity wants the receiving TCP entity to do. As shown in the case, SYNchronise with the sender by using the other listed data.

Activity 7: “nmap 192.168.1.11 –sX”

The following is the command and output for the activities:

Microsoft Windows [Version 10.0.17763.737] (c) 2018 Microsoft Corporation. All rights reserved. C:\Program Files (x86)\Nmap>nmap 192.168.1.11 -sX Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 20:44 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.00s latency). All 1000 scanned ports on 192.168.1.11 are open filtered Nmap done: 1 IP address (1 host up) scanned in 24.80 seconds Wireshark Output Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 20:48 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.00s latency). PORT      STATE    SERVICE 1/tcp     open     tcpmux 3/tcp     open     compressnet 4/tcp     open     unknown 6/tcp     open     unknown 7/tcp     open     echo 9/tcp     open     discard 13/tcp    open     daytime 17/tcp    open     qotd 19/tcp    open     chargen 20/tcp    open     ftp-data 21/tcp    open     ftp 22/tcp    open     ssh 23/tcp    open     telnet 24/tcp    open     priv-mail 25/tcp    open     smtp 26/tcp    open     rsftp …  

Figure 3: Screenshot 5

The scan shows the range of hosts scanned and filtered/open/closed ports on the network. It also displays the IP Address for the host network and the time period for the scan(O’Reilly Online Learning, 2020). Equally, the scan identifies the known and unknown packets, hence revealing the traffic being realized over the network.

Question 8: What Type of Information Can Be Captured In A Network Packet Analyser Such As Wireshark?

Wireshark is among the increasingly reliable network protocol analysers currently on the market. It can be used as a tool to perform complete network analysis(Irimia & Gottschling, 2016). As such, there are different types of information that can be captured using Wireshark tool. This include issues on a network through identified through troubleshooting, information about the issues on a network, debug problems and the ongoing network processes(Tibisan.com., 2020). Thus, Wireshark comes in handy as an effective tool to help solve or address the network problems.

Activity 9 & 10 Completed in the Software.

References

Irimia R. &Gottschling M (2016) Taxonomic revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodiversity Data Journal 4: E7720. https://doi.org/10.3897/BDJ.4.e7720. (n.d.). doi:10.3897/bdj.4.e7720.

O’Reilly Online Learning. (2020). Practical Packet Analysis, 2Nd Edition. [online] Available at: <https://www.oreilly.com/library/view/practical-packet-analysis/9781593272661/ch03s02.html> [Accessed 18 September 2020].

Tibisan.com. (2020). Wireshark Network Mapping – Switch and Port Discovery with CDP (Cisco Discovery Protocol) or LLDP (Link Layer Discovery Protocol) | Tibisan Project. [Online] Available at: <https://www.tibisan.com/itinfrastructure/networking/wireshark-network-mapping-cdp-lldp/> [Accessed 18 September 2020].

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00