Anda di halaman 1dari 9

POLITEKNIK UNGKU OMAR

DEPARTMENT OF INFORMATION TECHNOLOGY AND COMMUNICATION


Course Code

: FP611 - INFORMATION SYSTEM SECURITY

Labsheet

: 1

Title

: LAB 1

Name

: FAIZ ZUHAILI B MOHD


SAHIMIN

Matric
No.

: 01DNS13F1035

OBJECTIVES
1 . Student should be able to install Nmap.
TOOLS/SOFTWARE
1 .Dekstop PC / Laptop
2 .Nmap software
THEORY
Nmap is short for "network mapper," nmap is a veritable tool shed of functionality to
perform network scans. It can be used for security scans, simply to identify what services a
host is running, to fingerprint" the operating system and applications on a host, the type of
firewall a host is using, or to do a quick inventory of a local network. It is, in short, a very
good tool to know.Nmap uses raw IP packets in novel ways to determine what hosts are
available on the network, what services (application name and version) those hosts are
offering, what operating systems (and OS versions) they are running, what type of packet
filters/firewalls are in use, and dozens of other characteristics.

PROCEDURES
1.

Student will perform the installation Process (Attachment 1)

PRACTICAL ASSESSMENT
1.

What is the function of Nmap?

Nmap used to discover hosts and services on a computer network, thus creating a "map"
of the network. To accomplish its goal, Nmap sends specially crafted packets to the target
host and then analyzes the responses.

2.

List 3 types of threats.

-Trojan
-Virus
-Worm

3.

What is the importance of port scanning?

A port scan is a series of messages sent by someone attempting to break into a computer
to learn which computer network services, each associated with a "well-known" port
number, the computer provides. Port scanning, a favorite approach of computer cracker,
gives the assailant an idea where to probe for weaknesses. Essentially, a port scan consists
of sending a message to each port, one at a time. The kind of response received indicates
whether the port is used and can therefore be probed for weakness.

CONCLUSION
Nmap is a very powerful tool and it has ability to cover the very first aspects of penetration testing,
which include information gathering and enumeration.

CONCLUSION

POLITEKNIK UNGKU OMAR


DEPARTMENT OF INFORMATION TECHNOLOGY AND COMMUNICATION
Course Code

: FP611 - INFORMATION SYSTEM SECURITY

Labsheet

: 1

Title

: LAB 1

Name

: FAIZZUHAILI B MOHD
SAHIMIN

Matric
No.

: 01DNS13F1035

MARKING SCHEME

Verified by:
______________________________

CRITERIA

MARKS

PRACTICAL ASSESSMENT

/9

CONCLUSION

/1

TOTAL

/ 10

FAIZ ZUHAILI B MOHD SAHIMIN


NETWORK SECURITY : LAB 1

1)Nmap output

01DNS13F1035

2) Ports/ Hosts

3) Host Detail

4)Scans

5)Intense Scan plus UDP : Nmap Output

6)Intense Scan Plus TCP ports : Nmap Output

7)Quick Scan : Nmap Output

8) Quick scan plus : Nmap Output

9)Regular Scan : Nmap Ouptut

10) Slow comprehensive scan : Nmap Output

Anda mungkin juga menyukai