ITP 457 Lab 3

ITP 457 Lab 3 - ITP 457 – Lab#3 Name Email Due Feb 2 2009 Step 1 – Starting Backtrack • Start up Backtrack VM • Login o User root o Pass

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ITP 457 – Lab #3 Name: Email: Due: Feb 2, 2009 Step 1 – Starting Backtrack • Start up Backtrack VM • Login: o User: root o Pass: toor Step 2 – Starting Wireshark • Type the command startx • Right-click the desktop and select Run Command • Type wireshark in the text box, press ENTER o If you get a dialog box warning you about running as root:root, you can ignore it Step 3 – Starting the Capture with Wireshark • Click on menu bar Capture Interface • On the line with eth0 press the Start button Step 4 – Nmap to Scan the Network • Open up a terminal, by clicking the icon next to the K start menu o OR right‐click the desktop click Run Command type konsole • Type nmap o Observe the results and understand the different flags o What version of Nmap are you using? ________________________________________ o What is the option for a ping scan? ________________________________________ • Type nmap –sP 192.168.1.* and press ENTER o Observe the output o How many hosts did it find? ________________________________________ o List all the IP addresses of the hosts you found ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ ________________________________________ o How long did it take to do the scan? ________________________________________ If you want you can rerun the scan with this command • date; nmap –sP 192.168.1.*; date Step 5 – Analyze the output from Wireshark • Observe the output from Wireshark • Why are there so many ARP broadcasts? _________________________________________________________________________________________ _________________________________________________________________________________________ • What can you tell about the timing between broadcasts? _________________________________________________________________________________________ _________________________________________________________________________________________ • What do you notice about the source address? _________________________________________________________________________________________ _________________________________________________________________________________________ • Why do you think using ARP is better then opening a TCP connection to do a ping scan? _________________________________________________________________________________________ _________________________________________________________________________________________ • Restart the capture by clicking Capture Restart Step 6 – Use Nmap to scan open TCP ports....
View Full Document

This document was uploaded on 09/13/2010.

Page1 / 7

ITP 457 Lab 3 - ITP 457 – Lab#3 Name Email Due Feb 2 2009 Step 1 – Starting Backtrack • Start up Backtrack VM • Login o User root o Pass

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online