info_gathering_lab

advertisement
SYP Lab
Computer Security
Information Gathering &
Discovering Your Network’s Exploits
Section 1: Gathering Initial Information
1. Open Source: Conduct Open-Source research on the following
organizations’ web sites:
a. Gear West (www.gearwest.com)
2. Sam Spade #1: Using Sam Spade software conduct a NSLookup on the
following organizations’ web site and associated IP addresses:
a. Gear West (www.gearwest.com)
b.
3. Sam Spade #2: Using Sam Spade software conduct a Whois on the
following organizations’ web site and associated IP addresses:
a. Gear West (www.gearwest.com)
b.
Section 2: Discover Address Range of the Network
1. Using ARIN (www.arin.net), attempt to find the address range of
the following organization’s address
 Gear West (www.gearwest.com)
2. Using Traceroute, attempt to find the address range of the
other’s SYP network.
Section 3: Find Active Machines
 After Network address range has been found continue to find
active machines on this network
 Use PingScanner multipoint to accomplish this task
 Verify some of the connections with a ping from the command
prompt
Section 4: Find Open Ports on your local machine
 Using the utility of Active Ports to scan the ports on your
computer. Make certain that you scan all available ports on your
machine.
Section 5: Find Open Ports or Access Points on remote machines
 Using the utility of NetworkActiv, scan the active machines
within your subnet. Make certain that you scan all available
ports, while focusing on the servers that are in your subnet.
Section 6: Verify the Operating System (OS) of the networked machines
you are gathering information on
 Determine the OS of each system by using the NetworkActiv
utility. This utility will assist you in determining the type of
OS that is associated with each machine on your network.
Reminder: the trial version will make best guess at second type
of OS. Having this knowledge known to an attacker, can help them
determine which exploits can be used to on your system.
Section 7: Determine the services running on each port of the servers
 Make a best-guess attempt at the service running on each of the
server’s ports of the network that you are gathering information.
 Use the vulnerability scanner utility named Tenable NeWT
 Make certain that you check the vulnerability of each of your two
servers in your network.
 Once vulnerability list is created, verify list by checking with
a few of the port’s services by attempting to telnet these ports.
Section 8: Mapping out the network
 Attempt to map out the network’s devices by using the utility
named LAN Mapshot
 Place output of this analysis within the Microsoft Visio
application and save it to your C: drive and name the file
network_map1
Congratulations, you have successfully gathered information on a remote
network.
REMINDER: Hacking is a serious offense and punishable by law. Use these
tools strictly to protect your network. Do not utilize these tools in
a malicious manner.
Download