book as a main reference: Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .
Chapters to use
• Chapter 3: Scanning
Unit III Project Nmap and Nessus Scanning Assignment
Nmap:
Using the listed scans below, use Nmap to retrieve port information from your target. Scan the first 1,000 ports, retrieve version information, and identify the Operating System with all the scans when possible.
• TCP Connect Scan
• SYN Scan
• UDP Scan
• Xmas tree Scan
• Null Scan Take a screen shot of each step.
Nessus: Using Nessus, create a scan that scans the same hosts as the Nmap exercise. Take a screen shot of your results.
CYB – Project 3
Leave a Reply
CYB – Project 3
CYB – Project 3
Use our book as a main reference: Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .
Chapters to use
• Chapter 3: Scanning
Unit III Project Nmap and Nessus Scanning Assignment
Nmap:
Using the listed scans below, use Nmap to retrieve port information from your target. Scan the first 1,000 ports, retrieve version information, and identify the Operating System with all the scans when possible.
• TCP Connect Scan
• SYN Scan
• UDP Scan
• Xmas tree Scan
• Null Scan Take a screen shot of each step.
Nessus: Using Nessus, create a scan that scans the same hosts as the Nmap exercise. Take a screen shot of your results.