SlideShare a Scribd company logo
1 of 3
McConnell 1
Juanita M. McConnell
Cindy L. Casey
IT255P – Introduction to Information Systems Security
17 January 2014
Lab 1: Performing Reconnaissance and Probing Using Common Tools
Part 4: Challenge Questions
1. Use Wireshark and NetWitness Investigator to identify suspicious activity on the
network.
a. Open Wireshark and start a packet capture on the Student interface (Hint: Refer to
Part 1 of this lab).
b. Open Zenmap and perform another Intense Scan of the 172.30.0.0/24 subnet
(Hint:Refer toPart 3 of this lab).
c. Close Zenmap without saving the report.
d. Close Wireshark, but save the packet capture as a *.pcap file to the desktop when
prompted.
e. Open the *.pcap packet capture in NetWitness Investigator.
Answer: Below is a series of screen captures corresponding to the instructions of Part 4
Challenge Questions real-life challenge to investigate suspicious activity on a
network.
McConnell 2
McConnell 3

More Related Content

Similar to J_McConnell_Reconnaissance_Challenge

CNS440 – Lab Assignment Week 2 Complete Lab 1 Perfo.docx
CNS440 – Lab Assignment Week 2   Complete Lab 1 Perfo.docxCNS440 – Lab Assignment Week 2   Complete Lab 1 Perfo.docx
CNS440 – Lab Assignment Week 2 Complete Lab 1 Perfo.docx
mary772
 
Please include MutiSIM fileIntroductionWrite one to two p.docx
Please include MutiSIM fileIntroductionWrite one to two p.docxPlease include MutiSIM fileIntroductionWrite one to two p.docx
Please include MutiSIM fileIntroductionWrite one to two p.docx
mattjtoni51554
 
JConrad_Mod11_FinalProject_031816
JConrad_Mod11_FinalProject_031816JConrad_Mod11_FinalProject_031816
JConrad_Mod11_FinalProject_031816
Jeff Conrad
 
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_Thesis
Suz Fanous
 
Module ict society
Module ict societyModule ict society
Module ict society
Kak Yong
 
20 questions , multiple choiceQuestion 11.Which of the fol.docx
20 questions , multiple choiceQuestion 11.Which of the fol.docx20 questions , multiple choiceQuestion 11.Which of the fol.docx
20 questions , multiple choiceQuestion 11.Which of the fol.docx
vickeryr87
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
Conor Ryan
 
The Use of Wireless networks for Control Applications
The Use of Wireless networks for Control ApplicationsThe Use of Wireless networks for Control Applications
The Use of Wireless networks for Control Applications
Nativ Levy
 
27.2.10 lab extract an executable from a pcap
27.2.10 lab   extract an executable from a pcap27.2.10 lab   extract an executable from a pcap
27.2.10 lab extract an executable from a pcap
Freddy Buenaño
 

Similar to J_McConnell_Reconnaissance_Challenge (20)

CNS440 – Lab Assignment Week 2 Complete Lab 1 Perfo.docx
CNS440 – Lab Assignment Week 2   Complete Lab 1 Perfo.docxCNS440 – Lab Assignment Week 2   Complete Lab 1 Perfo.docx
CNS440 – Lab Assignment Week 2 Complete Lab 1 Perfo.docx
 
Please include MutiSIM fileIntroductionWrite one to two p.docx
Please include MutiSIM fileIntroductionWrite one to two p.docxPlease include MutiSIM fileIntroductionWrite one to two p.docx
Please include MutiSIM fileIntroductionWrite one to two p.docx
 
Hypriot Cluster Lab – An ARM-Powered Cloud Solution Utilizing Docker
Hypriot Cluster Lab – An ARM-Powered Cloud Solution Utilizing DockerHypriot Cluster Lab – An ARM-Powered Cloud Solution Utilizing Docker
Hypriot Cluster Lab – An ARM-Powered Cloud Solution Utilizing Docker
 
JConrad_Mod11_FinalProject_031816
JConrad_Mod11_FinalProject_031816JConrad_Mod11_FinalProject_031816
JConrad_Mod11_FinalProject_031816
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_Thesis
 
Module ict society
Module ict societyModule ict society
Module ict society
 
Network Analysis Using Wireshark Chapter 08 the expert system
Network Analysis Using Wireshark Chapter 08 the expert systemNetwork Analysis Using Wireshark Chapter 08 the expert system
Network Analysis Using Wireshark Chapter 08 the expert system
 
20 questions , multiple choiceQuestion 11.Which of the fol.docx
20 questions , multiple choiceQuestion 11.Which of the fol.docx20 questions , multiple choiceQuestion 11.Which of the fol.docx
20 questions , multiple choiceQuestion 11.Which of the fol.docx
 
SEC 420 Entire Course NEW
SEC 420 Entire Course NEWSEC 420 Entire Course NEW
SEC 420 Entire Course NEW
 
Network Access Control as a Network Security Solution
Network Access Control as a Network Security SolutionNetwork Access Control as a Network Security Solution
Network Access Control as a Network Security Solution
 
CMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMCMIT 321 FINAL EXAM
CMIT 321 FINAL EXAM
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploit
 
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
 
The Use of Wireless networks for Control Applications
The Use of Wireless networks for Control ApplicationsThe Use of Wireless networks for Control Applications
The Use of Wireless networks for Control Applications
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
 
27.2.10 lab extract an executable from a pcap
27.2.10 lab   extract an executable from a pcap27.2.10 lab   extract an executable from a pcap
27.2.10 lab extract an executable from a pcap
 
Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1Penetration Testing Project Game of Thrones CTF: 1
Penetration Testing Project Game of Thrones CTF: 1
 

J_McConnell_Reconnaissance_Challenge

  • 1. McConnell 1 Juanita M. McConnell Cindy L. Casey IT255P – Introduction to Information Systems Security 17 January 2014 Lab 1: Performing Reconnaissance and Probing Using Common Tools Part 4: Challenge Questions 1. Use Wireshark and NetWitness Investigator to identify suspicious activity on the network. a. Open Wireshark and start a packet capture on the Student interface (Hint: Refer to Part 1 of this lab). b. Open Zenmap and perform another Intense Scan of the 172.30.0.0/24 subnet (Hint:Refer toPart 3 of this lab). c. Close Zenmap without saving the report. d. Close Wireshark, but save the packet capture as a *.pcap file to the desktop when prompted. e. Open the *.pcap packet capture in NetWitness Investigator. Answer: Below is a series of screen captures corresponding to the instructions of Part 4 Challenge Questions real-life challenge to investigate suspicious activity on a network.