Reflection:
Foot-printing:The purpose of this lab is to teach us how to execute programs using scripted commands. So through network scanning, you can see the implementation of security performance more clearly.
Summarize the information discovered in the Lab about the network topology
We can summarize the capabilities we need to find into hosts.txt . In the txt file. In this way, we can effectively find out the results scanned by the host through LeafPad.
We can also use the Topology option to display the discovered network hosts that have been detected by scanning. And you can clearly see which networks have vulnerabilities from the topology.
The network consists of several Windows and Linux machines. There are 5 Windows machines and 3 Linux machines. From the analysis network port to Zenmap, you can see that there are several vulnerable hosts. On the other hand, Linux systems are secure and have fewer open ports than vulnerable hosts.
By using Nmap, the scan port can be used to detect open ports available in the system’s internal systems. These open ports are vulnerable points, and an attacker can destroy the entire network with a successful attack.
How can packet sniffing be used to detect potential issues on a network?
First, we can do this by turning on WireShark. There is a folder for Vulnerable Network Captures. We can use this operation to scan which data is vulnerable. After that, we can achieve the purpose of deletion by clearing the filter. Finally, we can click on Statistics and then select Conversations to see the Ethernet address of the device on the network. Therefore, you can see the traffic flow and port information of the same device.
Analyses the captured packets from Exercise 2 and filter the DNS requests sent from 192.168.27.12 to 192.168.27.1 and view the UDP stream.What can you tell about the DNS request?
The content of the DNS request is mainly through the address translation system. Domain name resolution is the process of re-converting a domain name into an IP address. A domain name corresponds to an IP address, but an IP address corresponds to multiple domain names. So multiple domain names can be resolved to an IP address at the same time.
Critical Thinking Analysis
This lab focuses on network footprint and packet sniffing. We can use these two methods to quickly and efficiently find out what is a network vulnerability. And we can clearly see what the packet will parse certain domain names.
However, this lab has some shortcomings. First, it must be operated simultaneously through the TigerVNC Viewer and WireShark. It is not possible to bring the two together. Second, it is possible to quickly grasp the information through packet sniffing. However, there is no filtering function.