0% found this document useful (0 votes)
6 views2 pages

Assignment 7

Uploaded by

ahmed hmada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

Assignment 7

Uploaded by

ahmed hmada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Assignment 7: Network Scanners & Network Mapping &

Report (3-4 hours)

Target Machine: 192.168.11.135

Scanning Tools Used: Nmap (Network Mapper), Python (NetworkX for visualization)

1. Nmap Advanced Scanning Techniques

Nmap was used to perform several advanced scanning techniques on the target machine to gather as much
information as possible about its services, operating system, and potential vulnerabilities.

-sV option allows us to detect the version of services running on open ports.
-O option enables Nmap to detect the operating system by analyzing various TCP/IP stack
behaviors.
vuln script looks for publicly known vulnerabilities (CVE-based) within the discovered
services.

2. Network Map Visualization

The scan results were used to create a basic network map that highlights the target machine and the services
it exposes to the network. For this task, Python’s NetworkX library was used to generate the visualization.

Visualization Code:

Generated Network Map:

• Node 1: 192.168.11.135 (Target


Machine, Ubuntu-based Linux OS)
• Node 2: SSH Service on port 22
running OpenSSH 7.6p1
• Node 3: HTTP Service on port 80
running Apache 2.4.18

The graph visually represents the network


services running on the target machine and the
relationships between these services and the
machine itself.
3. Understanding the Target Network Through Visualization

The network map provides a clear, visual overview of the services exposed by the target machine and helps
in understanding the structure and potential security concerns of the network.

Key Insights from the Visualization:

1. Service Exposure: The map shows that the target


machine has two services (SSH and HTTP) that are
publicly exposed. This information is essential in
determining the attack surface and formulating
defensive strategies.
2. Operating System: By detecting the machine’s
operating system (Linux, Ubuntu-based), we can
tailor the security assessment to known
vulnerabilities affecting Ubuntu and other similar
Linux distributions.
3. Potential Vulnerabilities: Although no critical
vulnerabilities were detected, the outdated version of Apache (2.4.18) could become a security risk if
not updated or properly configured. This might not be immediately exploitable, but it's an area to
monitor for patches.

How This Visualization Helps:

• Network Structure Clarity: The map provides a quick way to understand the network’s structure
and the role of each service on the target machine.
• Prioritization: It helps prioritize which services need further investigation, based on their exposure
and potential for exploitation.
• Mitigation Planning: Knowing the OS and service versions helps plan mitigation measures, such as
updating the Apache server or securing SSH access.

You might also like