Professional Documents
Culture Documents
OF NETWORK SECURITY
A very important principle of ethical security analysis is to only perform scans and penetration
tests against systems and networks that you have permission to scan and test. Thus, for the
purposes of this exercise, you should only perform a scan of your own computer, not any other
computers.
• http://nmap.org/download.html
For each service on your computer, figure out what the service is. You can ake a look at the
following database of assigned and typical port usages:
• http://www.speedguide.net/ports.php
TO SUBMIT
1. What services did you find running on your computer? What is the purpose of each? Were
any of them unexpected? If so, how can you disable them? (Also, please say what kind of
computer you are using.)
2. My web server is on the domain name www.douglas.stebila.ca. Scan it using nmap -F (the
-F means “fast scan”). (You have my permission to do so.) What ports do you find open? Do
you have any advice for me?