Posted: August 27th, 2021
NMAP Network Mapper
Name
Institutional Affiliation
NMAP Network Mapper
Activity 1: Wireshark Capture
Figure 1: Screenshot 1
Activity 2: nmap 192.168.1.11
Figure 2: Screenshot 2:
Wireshark Out
Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 21:34 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.0014s latency). PORT STATE SERVICE 1/tcp open tcpmux 3/tcp open compressnet 4/tcp open unknown 6/tcp open unknown 7/tcp open echo 9/tcp open discard 13/tcp open daytime 17/tcp open qotd 19/tcp open chargen 20/tcp open ftp-data 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 24/tcp open priv-mail 25/tcp open smtp 26/tcp open rsftp 30/tcp open unknown 32/tcp open unknown 33/tcp open dsp 37/tcp open time 42/tcp open nameserver 43/tcp open whois 49/tcp open tacacs 53/tcp open domain 70/tcp open gopher 79/tcp open finger 80/tcp open http 81/tcp open hosts2-ns 82/tcp open xfer 83/tcp open mit-ml-dev 84/tcp open ctf 85/tcp open mit-ml-dev 88/tcp open kerberos-sec 89/tcp open su-mit-tg 90/tcp open dnsix 99/tcp filtered metagram 100/tcp filtered newacct 106/tcp open pop3pw 109/tcp open pop2 110/tcp open pop3 111/tcp open rpcbind 113/tcp open ident 119/tcp open nntp 125/tcp open locus-map 135/tcp open msrpc 139/tcp open netbios-ssn 143/tcp open imap 144/tcp open news 146/tcp open iso-tp0 161/tcp open snmp 163/tcp open cmip-man 179/tcp open bgp 199/tcp open smux 211/tcp open 914c-g 212/tcp open anet 222/tcp open rsh-spx 254/tcp open unknown 255/tcp open unknown 256/tcp open fw1-secureremote 259/tcp open esro-gen 264/tcp open bgmp 280/tcp open http-mgmt 301/tcp open unknown 306/tcp open unknown 311/tcp open asip-webadmin 340/tcp open unknown 366/tcp open odmr 389/tcp open ldap |
Command Prompt Output
C:\Program Files (x86)\Nmap>nmap -Pn 192.168.1.11 Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 21:36 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.0031s latency). Not shown: 770 filtered ports, 54 closed ports PORT STATE SERVICE 1/tcp open tcpmux 7/tcp open echo 9/tcp open discard 25/tcp open smtp 49/tcp open tacacs 53/tcp open domain 70/tcp open gopher 80/tcp open http 82/tcp open xfer 85/tcp open mit-ml-dev 109/tcp open pop2 211/tcp open 914c-g 254/tcp open unknown 311/tcp open asip-webadmin 389/tcp open ldap 407/tcp open timbuktu 417/tcp open onmux 458/tcp open appleqtc 524/tcp open ncp 541/tcp open uucp-rlogin 545/tcp open ekshell 587/tcp open submission 593/tcp open http-rpc-epmap 617/tcp open sco-dtmg |
Screenshot 3: Wireshark Results
Screenshot 4: TCP Capture
Q.6. What Does The TCP Flags Show In The Wireshark Capture? Explain Your Answer
The TCP flags as demonstrated under screenshot 3 illustrates what sending the TCP entity wants the receiving TCP entity to do. As shown in the case, SYNchronise with the sender by using the other listed data.
Activity 7: “nmap 192.168.1.11 –sX”
The following is the command and output for the activities:
Microsoft Windows [Version 10.0.17763.737] (c) 2018 Microsoft Corporation. All rights reserved. C:\Program Files (x86)\Nmap>nmap 192.168.1.11 -sX Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 20:44 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.00s latency). All 1000 scanned ports on 192.168.1.11 are open filtered Nmap done: 1 IP address (1 host up) scanned in 24.80 seconds Wireshark Output Starting Nmap 7.80 ( https://nmap.org ) at 2020-09-18 20:48 E. Africa Standard Time Nmap scan report for 192.168.1.11 Host is up (0.00s latency). PORT STATE SERVICE 1/tcp open tcpmux 3/tcp open compressnet 4/tcp open unknown 6/tcp open unknown 7/tcp open echo 9/tcp open discard 13/tcp open daytime 17/tcp open qotd 19/tcp open chargen 20/tcp open ftp-data 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 24/tcp open priv-mail 25/tcp open smtp 26/tcp open rsftp … |
Figure 3: Screenshot 5
The scan shows the range of hosts scanned and filtered/open/closed ports on the network. It also displays the IP Address for the host network and the time period for the scan(O’Reilly Online Learning, 2020). Equally, the scan identifies the known and unknown packets, hence revealing the traffic being realized over the network.
Question 8: What Type of Information Can Be Captured In A Network Packet Analyser Such As Wireshark?
Wireshark is among the increasingly reliable network protocol analysers currently on the market. It can be used as a tool to perform complete network analysis(Irimia & Gottschling, 2016). As such, there are different types of information that can be captured using Wireshark tool. This include issues on a network through identified through troubleshooting, information about the issues on a network, debug problems and the ongoing network processes(Tibisan.com., 2020). Thus, Wireshark comes in handy as an effective tool to help solve or address the network problems.
Activity 9 & 10 Completed in the Software.
References
Irimia R. &Gottschling M (2016) Taxonomic revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodiversity Data Journal 4: E7720. https://doi.org/10.3897/BDJ.4.e7720. (n.d.). doi:10.3897/bdj.4.e7720.
O’Reilly Online Learning. (2020). Practical Packet Analysis, 2Nd Edition. [online] Available at: <https://www.oreilly.com/library/view/practical-packet-analysis/9781593272661/ch03s02.html> [Accessed 18 September 2020].
Tibisan.com. (2020). Wireshark Network Mapping – Switch and Port Discovery with CDP (Cisco Discovery Protocol) or LLDP (Link Layer Discovery Protocol) | Tibisan Project. [Online] Available at: <https://www.tibisan.com/itinfrastructure/networking/wireshark-network-mapping-cdp-lldp/> [Accessed 18 September 2020].
Place an order in 3 easy steps. Takes less than 5 mins.