. .
.
Port Scan attacks and its detection methodologies
.
.

The procedure for the experiment is as follows.

 

  1. Perform ssh on port 22 to the host 71.62.197.87 using the student credentials provided. Any standard SSH client software which supports SSH v2 can be used. For the windows client operating system, if there are no existing ssh client installed, a free ssh client (putty.exe) can be downloaded from the following location http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe. The integrity / md5sums of the downloaded ssh client can be verified at http://the.earth.li/~sgtatham/putty/0.60/md5sums. For the Linux and Mac client workstations the native ssh client can be used. For the linux and mac work stations, open the terminal and perform the following,
    ssh -l <student username> <Virtual Lab Terminal server host IP / Name>.
  2. Once logged in to the Virtual Lab Terminal Server issue the following command to login to the attack host,
    ssh -l <studentname> <attackhostname> .
  3. To perform the scan on all the reserved ports on a single host, please do the following. Once logged in to the attackhost, issue the following command "namp -v 192.168.75.50".
    The above mentioned command will scan all the reserved ports on the host "192.168.75.50".
  4. To perform the SYN based scan on all the available hosts / IP addresses on a class C lab network, perform the following,
    "nmap -sS 192.168.75.0/24".
    The command mentioned above will perform a evading, stealthy SYN based scan on all the hosts which are present in the network 192.168.75.0/24.
  5. To perform the scan to enumerate all the operating systems which are running on the target network, issue the following command for the scanning tool,
    "nmap -s -O 192.168.75.0/24".
    The command mentioned above will perform a scan to enumerate all the different operating systems in the network 192.168.75.0/24.

 

Cite this Simulator:

.....
..... .....

Copyright @ 2024 Under the NME ICT initiative of MHRD

 Powered by AmritaVirtual Lab Collaborative Platform [ Ver 00.13. ]