SYP Lab Computer Security Information Gathering & Discovering Your Network’s Exploits Section 1: Gathering Initial Information 1. Open Source: Conduct Open-Source research on the following organizations’ web sites: a. Gear West (www.gearwest.com) 2. Sam Spade #1: Using Sam Spade software conduct a NSLookup on the following organizations’ web site and associated IP addresses: a. Gear West (www.gearwest.com) b. 3. Sam Spade #2: Using Sam Spade software conduct a Whois on the following organizations’ web site and associated IP addresses: a. Gear West (www.gearwest.com) b. Section 2: Discover Address Range of the Network 1. Using ARIN (www.arin.net), attempt to find the address range of the following organization’s address Gear West (www.gearwest.com) 2. Using Traceroute, attempt to find the address range of the other’s SYP network. Section 3: Find Active Machines After Network address range has been found continue to find active machines on this network Use PingScanner multipoint to accomplish this task Verify some of the connections with a ping from the command prompt Section 4: Find Open Ports on your local machine Using the utility of Active Ports to scan the ports on your computer. Make certain that you scan all available ports on your machine. Section 5: Find Open Ports or Access Points on remote machines Using the utility of NetworkActiv, scan the active machines within your subnet. Make certain that you scan all available ports, while focusing on the servers that are in your subnet. Section 6: Verify the Operating System (OS) of the networked machines you are gathering information on Determine the OS of each system by using the NetworkActiv utility. This utility will assist you in determining the type of OS that is associated with each machine on your network. Reminder: the trial version will make best guess at second type of OS. Having this knowledge known to an attacker, can help them determine which exploits can be used to on your system. Section 7: Determine the services running on each port of the servers Make a best-guess attempt at the service running on each of the server’s ports of the network that you are gathering information. Use the vulnerability scanner utility named Tenable NeWT Make certain that you check the vulnerability of each of your two servers in your network. Once vulnerability list is created, verify list by checking with a few of the port’s services by attempting to telnet these ports. Section 8: Mapping out the network Attempt to map out the network’s devices by using the utility named LAN Mapshot Place output of this analysis within the Microsoft Visio application and save it to your C: drive and name the file network_map1 Congratulations, you have successfully gathered information on a remote network. REMINDER: Hacking is a serious offense and punishable by law. Use these tools strictly to protect your network. Do not utilize these tools in a malicious manner.