CIS 238 - UNIX System Administration



CIS 238 - UNIX System Administration

Lab Exercise #2: Network Analysis Tools and Utilities – nmap, ethereal, wireshark, tcpdump netcat (nc)

1) Install all nmap products: yum install nmap*

2) Install Wireshark: yum install wireshark*

3) Startup Wireshark, start a general packet capture on all interfaces.

4) Determine what ports on the instructors machine are open (nmap)?

nmap sT –p 1-1024

5) TELNET to the same port(s): telnet

6) SSH to the instructors machine. LOGIN as user1 and list long the home directory.

Using netcat (with two windows – client and server):

7) Simple client/server

nc -l 127.0.0.1 1111 (server window)

nc 127.0.0.1 1111 (client window)

This is a test

This is a test.

Ending communication with ^C (Ctrl-C)

(Ctrl-C) (client window)

8) Simple file transfer

nc -l 127.0.0.1 1234 > test.out (server window)

echo Hi There!!!!! | nc 127.0.0.1 1234 (client window)

9) Client to web server

echo -e "GET / HTTP/1.0\n\n\n" | nc -w 5 oakton.edu 80 (client window)

10) TELNET client/server

nc 127.0.0.1 -t -l 2323 | /bin/bash (server window)

nc 127.0.0.1 2323 (client window

echo "Hi there"

ls -al

logout

Lab Exercise #2: Network Analysis Tools and Utilities – nmap, ethereal, netcat (nc)

11) Web Host

web.txt

Welcome to Bob's Webpage

Welcome to Bob's Webpage!!!!!!!!

 

(as root, why? ) cat web.txt | nc 127.0.0.1 –v –l 80

Point browser to your system – 127.0.0.1.

12) Use nmap to determine the nature of the default gateway. What type of OS is it? What type device is it?

13) Stop wireshark trace and save trace as ~user1/lab2.cap

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download