IL Exercise 13: Network Scanning

This exercise is about using Netcat and Nmap to scan a computer network. Scanning a network is useful for network maintenance but can also be useful for attackers as a form of reconnaissance. You will do the work on the Immersive Labs platform, so make sure you have set up access before you begin.

Basic Port Scanning

  1. Login to Immersive Labs and start the Networking Scanning lab. While you wait for the Linux VMs to spin up, click on the Info button at the top-right of the screen and read the information panel.

  2. When the Kali Linux desktop is visible, click on the Network button at the top-right of the screen and make a note of the target’s IP address.

  3. Double-click on the Terminator icon on the desktop to start up a terminal window. In that window, review the options for Netcat with

    nc -h
    
  4. Click on the Tasks button at the top-right of the screen to open the tasks panel and view the questions for this lab. Use what you’ve learned about Netcat command line options to run the relevant commands and answer the first three questions.

  5. Nmap is a more sophisticated port scanning tool than Netcat. The basic command to probe a single port or range of ports is

    nmap -p PORTS IP_ADDRESS
    

    PORTS here can be a single port number or two port numbers separated by a hyphen. You can also use the --top-ports option instead of -p if you want to scan the top N ports instead of a specific port range. Use the command nmap -h in the terminal window for more details of command line options.

  6. Access the tasks panel again. Use what you’ve learned about Nmap options to run the relevant commands and answer the last two questions. When you are happy with your answers to all five questions, click Submit to complete the lab.

Nmap Scanning & Banner Grabbing

This part of the exercise goes deeper into the use of Nmap.

  1. Start the lab entitled Nmap: Episode 1 - Basic Scanning. While you wait for the Linux VMs to spin up, click on the Info button at the top-right of the screen and read the information panel.

  2. When the Kali Linux desktop is visible, click on the Network button at the top-right of the screen and make a note of the target’s IP address.

  3. Double-click on the Terminator icon on the desktop to start a terminal window. In that window, review the options for Nmap with

    nmap -h
    
  4. Click on the Tasks button at the top-right of the screen to open the tasks panel and view the questions for this lab. Use what you’ve learned from the information panel and from running nmap -h to run the relevant scans and answer the questions. When you are happy with your answers, click Submit to complete the lab.

    Hints:

    • The -sT, -sU and --top-ports options are relevant for answering the first two questions.

    • The output from the banner grab done for Q3 will help you answer Q6 and Q7.

    • For Q6 and Q8, you might find it helpful to repeat the banner grab, this time limiting it to a single port.