Search the whole station

网络安全课业代写 AST20203代写 Internet Security代写

AST20203 Internet Security

Tutorial 2

网络安全课业代写 Instructions: Student should submit this exercise by uploading your completed work (in MS Word format) to the Moodle under the

Instructions: 网络安全课业代写

Student should submit this exercise by uploading your completed work (in MS Word format) to the Moodle under the “Tutorial 2 Submission” link in the course site. The submission deadline is shown in Moodle.

Objectives:

To get familiar with the basic concepts in information security, and the basics of security scanning.

Tasks: 网络安全课业代写

1. Download and run the setup file of “Nmap Security Scanner” to install the programme from this link (https://nmap.org/dist/nmap-7.92-setup.exe). Nmap Security Scanner is a tool for discovering vulnerabilities in the network. You should use it with caution and make sure in legal way.

2. Targeting the UOWCHK website, perform “Reserved TCP ports Scanning” function of Nmap by entering the following command “nmap -v www.uowchk.edu.hk”

Number of TCP port opened: 
IP address of UOW web server: 

3.Perform the “Host Scanning” function of Nmap by entering the following command “nmap -sP xxx.xxx.xxx.*” (note: xxx.xxx.xxx is replaced by the first 3 octet of UOW web server, e.g. if IP address is 1.2.3.4, you should type “nmap -sP 1.2.3.*”)

网络安全课业代写
网络安全课业代写

4.Determine the number of hosts found in the “Host Scanning” result and list them out

Number of hosts found: 
List of hosts found:

5.

Choose any one of IP address obtained in step 4, perform the “OS Identification” function of Nmap by entering the following command “nmap -O xxx.xxx.xx.xxx” (note: xxx.xxx.xxx.xxx is replaced by any one IP address obtained in step 4)

IP address of the host: 
OS type of host: 

6.Choose another IP address from step 4, perform the “OS Identification” function of Nmap by entering the following command “nmap -O xxx.xxx.xx.xxx” (note: xxx.xxx.xxx.xxx is replaced by another IP address obtained in step 4)

IP address of the host: 
OS type of host: 

7.Perform the “Port Scanning” function of Nmap by entering the following command “nmap -A xxx.xxx.xxx.xxx” (note: xxx.xxx.xxx.xxx is replaced IP address of UOW web server)

Number of ports “open” in current: 
List the ports that are currently opening:

8. 网络安全课业代写

Perform the “Port Scanning” function of Nmap by entering the following command “nmap –p80 xxx.xxx.xxx.*” (note: xxx.xxx.xxx is replaced by the first 3 parts of IP address of UOW web server)

9.Determine the number of hosts found with port 80 opened in the result and list them out

Number of hosts with port 80 “open”: 
List of hosts with port 80 “open”:
Number of hosts with port 80 “closed”: 
List of hosts with port 80 “closed”:
Number of hosts with port 80 “filtered”: 
List of hosts with port 80 “filtered”: 

10. Refer to the link by nmap (http://nmap.org/book/man-port-scanning-basics.html), determine whether “closed” port or “filtered” port is better in terms of security with explanation.

11. For the steps 8 mentioned above, determine which step from the “Five Step of Attack” that we learn from the lecture is.

12. Determine which of the defence method(s) mentioned in the lecture can be applied to stop the attack mentioned in question 11 with explanation.

网络安全课业代写
网络安全课业代写

更多代写:CS网课托管价格  duolingo english test作弊  英国作业代写精算科学  research paper写作代写  留学生report写作代写  Proctoru代考

合作平台:essay代写 论文代写 写手招聘 英国留学生代写

The prev: The next:

Related recommendations

1
您有新消息,点击联系!