Lab instruction – Part I Configure all devices on isolated network using 192.168

Lab instruction – Part I
Configure all devices on isolated network using 192.168.77.0/24 network. Make sure all devices can ping each other before proceeding.
Disable all NICs exept usb NIC for use on lab, especially when actively scanning.
Using Kali and some of the scans shown last in class, target the windows 7 device. Scan for open ports etc. You will need to run 3 separate scan and interpret the results in a lab write up. If you are working with a partner you will need to provide 3 unique scans and write-ups, you and your partner will have separate submissions.
The write up will consist of a screen shot of the scan itself and the results. You will need to explain what that scan looks for and explain each result given with technical persective. in other words, stating ″port 80 is open″ is not an explanation. Explain the vulnerability of port 80, what service it is providing etc.
Lab Instruction – Part II
Change your target machine to the snort system. Run the same three scans, compare and contrast the results to that of Win7.
Research the rules/alerts that are enabled or would need to be enabled to notify system admins of such scans.
The lab is done i just need the writer part

This entry was posted in Computer science. Bookmark the permalink.

Leave a Reply

Your email address will not be published.