This exercise is about using Netcat and Nmap to scan a computer network. Scanning a network is useful for network maintenance but can also be useful for attackers as a form of reconnaissance. You will do the work on the Immersive Labs platform, so make sure you have set up access before you begin.
Login to Immersive Labs and start the Networking Scanning lab. While you wait for the Linux VMs to spin up, click on the Info button at the top-right of the screen and read the information panel.
When the Kali Linux desktop is visible, click on the Network button at the top-right of the screen and make a note of the target’s IP address.
Double-click on the Terminator icon on the desktop to start up a terminal window. In that window, review the options for Netcat with
nc -h
Click on the Tasks button at the top-right of the screen to open the tasks panel and view the questions for this lab. Use what you’ve learned about Netcat command line options to run the relevant commands and answer the first three questions.
Nmap is a more sophisticated port scanning tool than Netcat. The basic command to probe a single port or range of ports is
nmap -p PORTS IP_ADDRESS
PORTS
here can be a single port number or two port numbers separated
by a hyphen. You can also use the --top-ports
option instead of -p
if you want to scan the top N ports instead of a specific port range.
Use the command nmap -h
in the terminal window for more details of
command line options.
Access the tasks panel again. Use what you’ve learned about Nmap options to run the relevant commands and answer the last two questions. When you are happy with your answers to all five questions, click Submit to complete the lab.
This part of the exercise goes deeper into the use of Nmap.
Start the lab entitled Nmap: Episode 1 - Basic Scanning. While you wait for the Linux VMs to spin up, click on the Info button at the top-right of the screen and read the information panel.
When the Kali Linux desktop is visible, click on the Network button at the top-right of the screen and make a note of the target’s IP address.
Double-click on the Terminator icon on the desktop to start a terminal window. In that window, review the options for Nmap with
nmap -h
Click on the Tasks button at the top-right of the screen to open the
tasks panel and view the questions for this lab. Use what you’ve learned
from the information panel and from running nmap -h
to run the relevant
scans and answer the questions. When you are happy with your answers,
click Submit to complete the lab.
Hints:
The -sT
, -sU
and --top-ports
options are relevant for answering
the first two questions.
The output from the banner grab done for Q3 will help you answer Q6 and Q7.
For Q6 and Q8, you might find it helpful to repeat the banner grab, this time limiting it to a single port.
□