logo

Analysis of Host Discovery Assignment 2022

   

Added on  2022-09-28

22 Pages1377 Words21 Views
 | 
 | 
 | 
Analysis of Host Discovery Assignment 2022_1

Table of Contents
PART A........................................................................................................................ 3
Project summary..................................................................................................... 3
summarize............................................................................................................... 5
Tasks (four tasks) of Nmap....................................................................................5
Feature....................................................................................................................... 6
a)............................................................................................................................. 6
b)............................................................................................................................. 6
C)............................................................................................................................. 6
d)............................................................................................................................. 6Mitigation plan............................................................................................................ 6
Analysis of host discovery.......................................................................................... 7
PART B...................................................................................................................... 12
Setup of Firewall................................................................................................... 12
Practical................................................................................................................ 13
firewall Status....................................................................................................... 15
Enable firewall or disable firewall..........................................................................15
3. Add a firewall rule and Allow services TCP, SSH and samba.............................16
4. Check firewall rules........................................................................................... 17
5 . Allow HTTP port, deny the port.........................................................................176. Allow and deny protocol from any to any port...............................................187. Check firewall rules........................................................................................ 198. Allow HTTP for access specific service...........................................................20
Conclusion................................................................................................................ 22
Page | 2
Analysis of Host Discovery Assignment 2022_2

PART A
Project summary
The network is very significant for the business process. Without a network, we
cannot increase the efficiency of the business process. The network helps us to
generate information and increase communication. Information will be broken down
into packets and information packets send on the network from source to
destination. Day by day network communication is increasing but there is also
increasing the possibility of the hacking. Security issues also increasing due to the
cracker. They are stealing information on the network and they are responsible for
the loss of information. network security is a primary objective for any company.
Without security, we cannot provide the quality of the service. Weak security will
increase the gap of the network (G. S. Rao. 2014). There are various network
security tool is available on the network. Here, we are going to use the Nmap tool.
This tool helps to check and monitoring the network. Nmap helps to map and
protect the network. We can also scan the port of the network and check the
vulnerability. This tool helps to configure the network server and also scan the
insecure network.
Page | 3
Analysis of Host Discovery Assignment 2022_3

summarize
The network security tool helps to protect network data. Nmap is helped to scan the
port of the network and check the port is secure or not. the map can check the open
port of the system. Nmap does not allow to illegally. This tool helps to explorer
device and helps to protect the network. map ensure the valid configuration of the
network and also check the firewall configuration. It can scan and filter the ports of
the network. Nmap has a smart default network setting and you can run the Nmap
without any specific setting. It is a better choice to a user the Nmap tool for network
security. We can choose the tool which helps to identify the network IP address. It
also helps to identify the IP address of the network (S. Shin. 2013). Nmap is an
open-source tool and we can use it without any license. Nmap provides the program
which is capable the manage the network services and host control. It also helps to
filter the packets. This tool able to scan the network with high speed.
Tasks (four tasks) of Nmap
we can easily scan the vulnerabilities of TCP protocol. As per the study of RCF. No
one packet has SYN and RSS, AC. It does not get any response and no return of the
package. It can scan and pass through the router and firewall filter.
It helps to scan and helps to filter. It is an IDS system that helps to identify the
zombies. The remote device will be an explorer by NIPP.
An Nmap scan covers the filter in some cases like an IPID scan. The NIPP manager
exports to a remote device using another device. (Often referred to as zombies)
without collecting information each (Gordon Lyon.2002).
It helps to protect the system and networks from the attacks.
It helps to set up a firewall and identifies the open port.
We can use -SA and set up the firewall by TCP ACK.
It helps to network mapping and also helps to host detection.
Page | 4
Analysis of Host Discovery Assignment 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Assessment on a Firewall
|11
|891
|145

Web Application Security: Port Scanning, OSINT, and XSS Attacks
|14
|2465
|94

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|20
|3651
|133

Firewall and Configuration Report 2022
|22
|1741
|23

Definitive Guide to Nmap (Network Mapper)
|11
|2038
|41

Lucent pharma - Assignment
|34
|4666
|75