Professional Documents
Culture Documents
CEH v8 Labs Module 03 Scanning Networks PDF
CEH v8 Labs Module 03 Scanning Networks PDF
All Packets. ‘CERI Lab Manaal Page 25 TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Repeodictoa i Sticty Probe‘Module 03 - Scanning Networks © Ethernet type I WJ Destination Address: Dopsioa, Packers Sear ‘Ths tows tae aumbec of packers sent meee (Com Pacet Bales Notersmishyou enh depisthe paces seat vn ‘wnsoccenly, 0, thee Ja packet ao eat ot [FIGURE 171 See cation tose he expr He & Pockatacocpht pct cana pi a yep Lab Analysis Analyze and document the results related to the lab exercise. ieved TO CMEC cen at ener er Used: Realtelx PCIe Family Contuoller [Selected Packet Name: ARP Packets | Result: Captured packets are saved in packets.csepkt_| ‘CERI Lab Manal Page TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Repeodictoa i Sticty Probe‘Module 03 - Scanning Networks PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB. Questions 1. Analyze how Colasoft Packet Buller affects your network traftic while analyzing your network. 2, Evaluate what types of instant messages Capsa monitors. ‘Determine whether the packet butter affects performance. I yes, then what steps do yon take to avoid or rechice its effect on software? Sreetakeomtec creer tine OYes EINo Platform Supported © Classroom lilabs ‘CEH Lab Manaal Page 257 TEhical Hacking and Countermeasnoes Copragin © by BC Cosma “Al Rights Reserved. Reproduction is Sticty Probie.‘Module 03 - Scanning Networks Scanning Devices in a Network Using The Dude The Dude automatically scans all devces within specified subnets, draws and lays out a map of your networks, monitors services of your devices, and alerts you in case some service has problems. Lab Scenario In the previous lab you leaned how packets can be captured using Colasoft Packet Builder. Attackers too can sniff can captase and analyze packets trom a network and obtain specific network information. The attacker can disrupt communication between hosts and clients by modifying system configurations, or throngh the physical destmction of the network. As an expert ethical hacker, you should be able to gather information on ‘organizations network to check for vulnerabilities and fix them before an attacker gets to compromise the machines using those vulnerabilities. If you detect any attack that has been performed on a network, immediately implement preventative measures to stop any additional unauthorized access. In this lab yon will learn to use The Dude tool to scan the devices in a network and the tool will alert you if any attack has been performed on the network. Lab Objectives ‘The objective of this lab is to demonstrate how to scan all devices within specified subnets, draw and layout a map of your networks, and monitor services on the network. = Toots - demonstratedin. Lab Environment {this lab are To camry out the lab, you need: available in 5 } DicEH. * The Dudle is located at DACEH-Tools\CEHV8 Module 03 Scanning Tools\cEHV8 Networks\Network Discovery and Mapping Tools\The Dude Module 03 * You can also download the latest version of The Dude fiom the ‘Scanning http:/ /seww.miksotik.com/thednde php Networks: “CER Lab Nanna Page 8 Tihs Hacking and Countermeasures Copragn © by BC Comal ‘A Righs Revered Rapsodvcton i Suacty Probeed,‘Module 03 - Scanning Networks = Ifyou decide to download the latest version, then screenshots shown in the lab might differ * A computer mnning Windows Server 2012 "Double-click the The Dude and follow wizard-driven installation steps to install The Dude * Administrative privileges to mn tools Lab Duration Time: 10 Minutes Overview of The Dude ‘The Dude network monitor is a new application that can dramatically improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices, and alert you in case some service has problems, Lab Tasks 1. Launch the Start menu by hovesing the mouse cursor on the lower-left coer of the desktop. FIGURE 181: Widows Seve 2012 Destop iw Stas 1 2. In the Start menu, to launch The Dude, click The Dude icon. Launch The Dude ‘CEH Lab Manaal Page 2 TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Reprodichon s Stacy Probate‘Module 03 - Scanning Networks FIGURE 182 Wows See 2012-Sat nes 3, The main window of The Dude will appear. FIGURE 183 Mai iow of Te Dae 4, Click the Discover button on the toolbar of the main window. FIGURE 84S aorta 5, The Device Discovery window appeats. ‘CEH Tab Manaal Page 25) TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Repeodictoa i Sticty Probe‘Module 03 - Scanning Networks Scan Newote: 00002 SSCSCSC~S ot Cs -]. || FA NetwaksTo Ao Scan Back Ut: one Dewce Name Preference: [DNS, SNMP, NETBIS.1P Dacovery Mode: fast canby ping) rable ocan each serves) . Recurive Hops: [T=] 2 Layee Map Mtr Dacovery Complete FIGURE 186 Desee dicorey ior In the Device Discovery window, specify Sean Networks sange, select default fiom the Agent drop-down list, select DNS, SNMP, NETBIOS, and IP from the Device Name Preference drop-down list, and click Sean Newots: fi000072 S a_i 1 his twas Te to Sco teaua: fre SSS TL [Breton fowon [ons SwPNETBOSP Dacovery Mode: ( fast ecanby ping) ~ rable (econ each serves) Recurive Hops: [T=] 2p Layout Map ater Discovery Conse FIGURE 187 Sect ence rane pee Once the scan is complete, all the devices connected to a particular network will be displayed, “CEH Lab Manal Page 261 TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Repeodictoa i Sticty Probe‘Module 03 - Scanning Networks i figansenet ent e ETE i = EE ue Hea | FIGURE 188 Over of seodk connection information about that device. FIGURE 189 Detaled ifounston ofthe deze 9. Now, click the down atrow for the Local drop-down list to see information on History Actions, Tools, Files, Logs, anid so on. ‘CEH Lab Manaal Page 262 TEhical Hacking and Countermearnces Coppagin © by BC Cosma “AL Rights Reserved Repeodictoa i Sticty ProbeFIGURE 1810 Seeing Lol infoanation ‘CERI Lab Manaal Page 265‘Module 03 - Scanning Networks 1. As described previously, you may select all the other options from the drop-down list to view the xespective information. 12, Once scanaing is complete, cick the (® tutto to disconnect. -anning, : ‘asa URE ei meet ee Lab Analysis Analyze and document the results related to the lab exercise. Soyer Information Collected / Objectives Achieved IP Address Range: 10.0.0.0— 10.0.0.24 Device Name Preferences: DNS, SNMP, The Dude NETBIOS, IP Output: List of connected system, devices in ‘Network ‘CERI Lab Manaal Page 50 TEhical Hacking and Countermearnces Coppagin © by BC Cosma “Ad Rights Revere Reprodicuon s Stacy Probe‘Module 03 - Scanning Networks PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS RELATED TO THIS LAB. etre No Hilabs ‘CEH Lab Manaal Page 2 TEhical Hacking and Countermeasnoes Copragin © by BC Cosma “Al Rights Reserved. Reproduction is Sticty Probie.