You are on page 1of 4

FEDERAL POLYTECHNIC NEKEDE OWERRI IMO STATE

PRACTIAL REPORT
DONE BY
OGIDI UCHENNA GODSWILL

REG NO:
20H/0074/CS

DEPARTMENT:
COMPUTER SCIENCE

LEVEL:
HND II MORNING

COURSE CODE:
COM 426

COURSE TITLE:
COMPUTER SECURITY

LECTURER:
MR PRINCE.O.

DATE:
DECEMBER 2022
TASK 1
Perform Host Discovery using Nmap

Nmap is a utility used for network discovery, network administration, and security auditing. It is also used
to perform tasks such as network inventory, managing service upgrade schedules, and monitoring host or
service uptime.

-PR Preforms the ARP ping scan

The ARP Ping first pings an IP address on your LAN with a broadcast MAC address in the ARP packet.
If an ARP response packet is received from the device, it continues to ping using the unicast ARP packet
(by unicast we mean the target MAC address came from the first response to our broadcast).

–PU Performs the UDP scan


The UDP ping scan sends UDP packets to the target host; a UDP response means that the host is active. If
the target host is offline or unreachable, various error messages such as “host/network unreachable” or
“TTL exceeded” could be returned.
–PE
performs the ICMP echo ping scan.

The ICMP echo ping scan involves sending ICMP echo requests to a host. If the target host is alive, it will
return an ICMP echo reply. This scan is useful for locating active devices or determining if the ICMP is
passing through a firewall.

Result
From the screenshot above it shows that all the scans were performed successfully.
Internet security companies can use Nmap to scan a system and understand what weaknesses exist that a
hacker could potentially exploit. As the program is open-source and free, it is one of the more common
tools used for scanning networks for open ports and other weaknesses.
TASK 2

Perform Host Discovery using Angry IP Scanner

Angry IP Scanner is an open-source and cross-platform network scanner designed to scan IP addresses as
well as ports. It simply pings each IP address to check if it is alive; then, optionally by resolving its
hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host
can be extended with plugins.

Result

After the scan it showed there were 2 alive hosts in the target range of IP addresses.

CONCLUSION

I observed from task 1 that the ping scans are necessary to find weakness in a computer system to better
take measures to safeguard it from hackers.

From task 2 I discovered that, Angry IP scanner is a very fast IP address and port scanner. It can scan IP
addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any
installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to
check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports,
etc. The amount of gathered data about each host can be extended with plugins. It also has additional
features, like NetBIOS information (computer name, workgroup name, and currently logged in Windows
user), favorite IP address ranges, web server detection, customizable openers, etc. Scanning results can be
saved to CSV, TXT, XML or IP-Port list files. With help of plugins, Angry IP Scanner can gather any
information about scanned IPs. Anybody who can write Java code is able to write plugins and extend
functionality of Angry IP Scanner.

You might also like