NETWORK INFRASTRUCTURE

NETWORK INFRASTRUCTURE

SECURITY EVALUATION

JAMES WOOD

CMP314: Computer Networking 2 BSc Ethical Hacking Year 3 2020/21

.

Contents

1 Introduction .......................................................................................................................................... 1 1.1 Overview ....................................................................................................................................... 1

2 Mapping the Network........................................................................................................................... 2 2.1 Network Map ................................................................................................................................ 2 2.2 Network Mapping Process ............................................................................................................ 2 2.2.1 Nmap Scan ............................................................................. Error! Bookmark not defined.

3 Discussion............................................................................................................................................ 21 3.1 General Discussion ...................................................................................................................... 21 3.2 Countermeasures........................................................................................................................ 21 3.3 Future Work ................................................................................................................................ 21

References part 1........................................................................................................................................ 22 References part 2........................................................................................................................................ 24 Appendices part 1 ....................................................................................................................................... 25

Appendix A .............................................................................................................................................. 25 Appendix B .............................................................................................................................................. 25 Appendix C - Suggestions for formatting figures/tables/screenshots in the body of the text ............... 25 Appendices part 2 ....................................................................................................................................... 27

.

1 INTRODUCTION

1.1 OVERVIEW

ACME Inc. parted ways with a long-time employee who was the network manager in acrimonious circumstances. After later trying to access the documentation for the network the employee was in charge off appears missing or does not exist. The lack of documentation has brought serious concerns with the senior management as this could result in some serious security implications. ACME Inc. have employed me to conduct a security evaluation on the network to look for any security issues. The company have supplied a machine connected to the network with Kali Linux preloaded as the company are only happy with the tools on the Kali machine and don't trust unproven tools on the network.

1|Page

2.1 NETWORK MAP

2 MAPPING THE NETWORK

2.2 NETWORK MAPPING PROCESS

Nmap is an open source scanner that allows the user to scan for IP addresses on a network by analyzing responses from packets sent to the IP inputted.

To begin mapping the network Nmap was used with the -sn command which allows a can of a range of the IP inputted in the command. In this case "192.168.0.0/24 was used to discover any active IPs across the network. It was discovered 12 new connections scattered across the network that weren't already accounted for. From here, the next step was to decipher where each address is in correlation to our address.

Figure 1 Nmap scan results

2|Page

The IP addresses discovered from this scan were as follows: 192.168.0.33 192.168.0.34 192.168.0.129 192.168.0.130 192.168.0.193 192.168.0.203 192.168.0.210 192.168.0.225 192.168.0.226 192.168.0.229 192.168.0.233 192.168.0.242 From this point Nmap was used to scan all the ports on the found addresses. Screenshots of these results were used for reference and are displayed in Appendice A.

We know from IP config that our address is 192.168.0.200 so from here it is important to know where the Kali machine is in terms of the network itself. To do this, form the kali Machine using arp gave an output of the 192.168.0.193 address.

Figure 2 Arp scan from 192.168.0.200

3|Page

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download