Question

In: Computer Science

network security tool- Nmap • Platform and tools used • Design of experiments (attack/defense) • Preliminary...

network security tool- Nmap
• Platform and tools used
• Design of experiments (attack/defense)
• Preliminary tests
• IEEE style report

Solutions

Expert Solution

Platform and Tool used:

1- Nmap and Zenmap (the graphical front end) are available in several versions and formats.

Available for Windows, Linux MAC.

Design of experiments (attack/defense)

Nmap features include:

  • Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.
  • Port scanning  – Enumerating the open ports on target hosts.
  • Version detection – Interrogating network services on remote devices to determine application name and version number.
  • OS detection – Determining the operating system and hardware characteristics of network devices.
  • Scriptable interaction with the target – using Nmap Scripting Engine(NSE) and Lua programming language.

Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.

Usage and Examples

The inner workings of OS detection are quite complex, but it is one of the easiest features to use. Simply add -O to your scan options. You may want to also increase the verbosity with -v for even more OS-related details. This is shown in Example 8.1.

Preliminary tests

Example: OS detection with verbosity (-O -v)

Including the -O -v options caused Nmap to generate extra Information

IEEE style report

Abstract:

As the number of devices connected to the Internet has been exponentially increasing, the degree of threats to those devices and networks has been also increasing. Various network scanning tools, which use fingerprinting techniques, have been developed to make the devices and networks secure by providing the information on its status. However, the tools may be used for malicious purposes. Using network scanning tools, attackers can not only obtain the information of devices such as the name of OS, version, and sessions but also find its vulnerabilities which can be used for further cyber-attacks. In this paper, we compare and analyze the performances of widely used network scanning tools such as Nmap and Nessus. The existing researches on the network scanning tools analyzed a specific scanning tools and they assumed there are only small number of network devices. In this paper, we compare and analyze the performances of several tools in practical network environments with the number of devices more than 40. The results of this paper provide the direction to prevent possible attacks when they are utilized as attack tools as well as the practical understanding of the threats by network scanning tools and fingerprinting techniques.

Published in: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)

Date of Conference: 5-8 July 2016

Date Added to IEEE Xplore: 11 August 2016

ISBN Information:

Electronic ISSN: 2165-8536

INSPEC Accession Number: 16214838

DOI: 10.1109/ICUFN.2016.7537162

Publisher: IEEE

Conference Location: Vienna, Austria


Related Solutions

zenmap/nmap is a powerful network administration tool Based on your readings and experimentation, write a paragraph...
zenmap/nmap is a powerful network administration tool Based on your readings and experimentation, write a paragraph on how nmap/zenmap works, what types of information it provides ? Note: provide relaible refrences for your answer.
describe the tools used for network management
describe the tools used for network management
A force platform is a tool used to analyze the performance of athletes measuring the vertical...
A force platform is a tool used to analyze the performance of athletes measuring the vertical force that the athlete exerts on the ground as a function of time. Starting from rest, a 63.0 kg athlete jumps down onto the platform from a height of 0.690 m. While she is in contact with the platform during the time interval 0 < t < 0.8 s, the force she exerts on it is described by the function below. F = (9...
Network security question: what is dns? how does it work? identify the attack surface of dns....
Network security question: what is dns? how does it work? identify the attack surface of dns. clearly detail how the exploitable services of dns can be attacked
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
You’ll create a security infrastructure design document for a fictional organization. The security services and tools...
You’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. The following elements should be incorporated into your plan: *Authentication system *External website security *Internal website security *Remote access solution *Firewall and basic rules...
Discuss the tools used in Network monitoring. How are different tools different in the results obtained?...
Discuss the tools used in Network monitoring. How are different tools different in the results obtained? Would you say that using a different tool would give better results? Please explain.
“In May 2019 Australian graphic design tool website Canva suffered an attack that exposed email addresses,...
“In May 2019 Australian graphic design tool website Canva suffered an attack that exposed email addresses, usernames, names, cities of residence, and salted and hashed with bcrypt passwords (for users not using social logins — around 61 million) of 137 million users. Canva says the hackers managed to view, but not steal, files with partial credit card and payment data. (Sourced from IT Security agency) Referring to the case given, list and explain 2 steps that can help prevent data...
Provide at least three methods or tools used to attack web servers as well as provide...
Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Assignment Objectives: Identify web application vulnerabilities and tools used to protect web servers. Discuss securing web applications. Review the tools used to attack Web servers. 500 words or more, please.
Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security...
Security auditors deploy many of the tools routinely used by penetration testers of an organization’s security staff during their security assessments. The key difference is that they are performed by an independent auditor. Auditors provide an impartial and unbiased view of the state the security landscape of an organization. Using credible sources, outline the rules of engagement (best practices) that a security auditor would follow as an ethical practicing professional. (minimum 450 words)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT