Building on exercises from our information gathering and threat modeling, we can now begin to actively query our victims for vulnerabilities that may lead to a compromise. We have narrowed down our attack surface considerably since we first began the penetration test with everything potentially in scope.

Objective

The objective of this lab is to help students in conducting network scanning, analyzing the network vulnerabilities, and maintaining a secure network. You need to perform a network scan to:
Learn to Analyze Network Vulnerabilities
  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Scenario

Vulnerability scanning determines the possibility of network security attacks. It evaluates the organization's systems and network for vulnerabilities such as missing patches, unnecessary services, weak authentication, and weak encryption. Vulnerability scanning is a critical component of any penetration testing assignment. You need to conduct penetration testing and list the threats and vulnerabilities found in an organization'¬ôs network and perform port scanning, network scanning, and vulnerability scanning to identify IP/hostname, live hosts, and vulnerabilities.

Scanning Networks Exercises

The Ethical Hacking Exercises / Scanning Networks Lab contains the following Exercises:

  • Scanning System and Network Resources Using Advanced IP Scanner
  • Banner Grabbing to Determine a Remote Target System using ID Serve
  • Fingerprinting Open Ports Using the Amap Tool
  • Monitoring TCP/IP Connections Using the CurrPorts Tool
  • Exploring and Auditing a Network Using Nmap
  • Scanning a Network Using the NetScan Tools Pro
  • Drawing Network Diagrams Using LANSurveyor
  • Mapping a Network Using the Friendly Pinger
  • Auditing Scanning by using Global Network Inventory
  • Basic Network Troubleshooting Using the MegaPing
  • Scanning the Network Using the Colasoft Packet Builder
  • Scanning Devices in a Network using The Dude

The Virtual Private Cloud for this Lab set utilizes:


Ethical Hacking Exercises are available as part of the following subscription:

CEHproductimage

The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography
Price: $199
Add to Cart
View Cart

Buy Now