Lab12_IS_DP.pdf
Lab12_IS_DP.pdf
Lab work 12
WARNING: Points WILL NOT BE COUNTED for plagiarism or copying someone
else's work (plagiarism is a violation copyright)
ASSESSMENT: Students are required to demonstrate and receive a grade for their lab
work during class.
IP address is a unique network address of a node in a computer network built using the IP
protocol. The Internet requires globally unique addresses; in the case of working on a local
network, the uniqueness of the address within the network is required.
MAC address (Media Access Control - also Hardware Address) is a unique identifierassigned
to each piece of active computer network equipment.
Subnet mask is a bit mask that determines which part of the IP address of a network host refers
to the network address, and which part refers to the address of the host itself in this network (in
this case, unlike the IP address, the subnet mask is not part of the IP packet) . For example, a
host with an IP address of 12.34.56.78 and a subnet mask of 255.255.255.0 is on the network
12.34.56.0 with a prefix length of 24 bits. For IPv6 addressing, the address
2001:0DB8:1:0:6C1F:A78A:3CB5:1ADD with a prefix length of 32 bits (/32) is located on the
network 2001:0DB8::/32.
DHCP is a network protocol that allows computers to automatically obtain an IP address and
other parameters necessary to operate on a TCP/IP network. This protocol operates on a client-
server model. For automatic configuration, the client computer, at the network device
configuration stage, contacts the so-called DHCP server and receives the necessary parameters
from it. The network administrator can specify the range of addresses distributed by the server
among computers. This allows you to avoid manual configuration of network computers and
reduces the number of errors. The DHCP protocol is used on most TCP/IP networks.
Ping scan
The most common and simplest scanning method is a simple ping scan, which involves
sending ICMP packets to different hosts. The host that is active will respond to these packets.
TCP Connect()
The second scanning method available is TCP Connect. It consists in the fact that thescanning
machine tries to establish a connection with the scanned machine. A successful result indicates
that the port is open, an unsuccessful result indicates that it is closed or filtered. This scanning
is easily detected by the huge number of entries in the log file of unsuccessful attempts to
establish a connection and errors in the execution of this operation.It is clear that the protection
tools will block the address that causes errors with maximum speed.
-v: Increase verbal level (set twice or more to increase effect)
TCP-SYN
A more advanced scanning method is TCP SYN - the so-called “half-open scan”. When called,
Nmap sends a SYN packet, as if to establish a new connection. If the response contains the
SYN or ACK flags, the port is considered open. The RST flag says otherwise. If a response is
received indicating that the port is open, nmap immediately sends an RST packet to reset the
connection that has not yet been established. Scanning is carried out onlyif you have superuser
rights (root).
ACK scan
ACK scanning consists of transmitting ACK packets to the scanned port. If an RST packet is
received in response, the port is classified as not filtered. If there is no response or the response
comes in the form of an ICMP port unreachable message, the port is considered filtered. This
method will never show the port status as "open".
TCP Window
TCP Window - similar to ACK scanning, however, by the values of the Initial Window field
of the TCP packet that came in response, you can determine open ports.
RPC scan
RPC scanning is used to determine the program serving the port and its version, and consists
of “flooding” open TCP or UDP host ports with SunRPC shell NULL packets.
OS Scan
And finally, the last one is scanning, used to determine the OS on the scanned host.