Building on exercises from our information gathering and threat modeling, we can now begin to actively query our victims for vulnerabilities that may lead to a compromise. We have narrowed down our attack surface considerably since we first began the penetration test with everything potentially in scope.

Objective

The objective of this lab is to help students in conducting network scanning, analyzing the network vulnerabilities, and maintaining a secure network. You need to perform a network scan to:
Learn to Analyze Network Vulnerabilities
  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Scenario

Vulnerability scanning determines the possibility of network security attacks. It evaluates the organization's systems and network for vulnerabilities such as missing patches, unnecessary services, weak authentication, and weak encryption. Vulnerability scanning is a critical component of any penetration testing assignment. You need to conduct penetration testing and list the threats and vulnerabilities found in an organization'¬ôs network and perform port scanning, network scanning, and vulnerability scanning to identify IP/hostname, live hosts, and vulnerabilities.

Scanning Networks Exercises

The Ethical Hacking Exercises / Scanning Networks Lab contains the following Exercises:

  • Scanning System and Network Resources Using Advanced IP Scanner
  • Banner Grabbing to Determine a Remote Target System using ID Serve
  • Fingerprinting Open Ports Using the Amap Tool
  • Monitoring TCP/IP Connections Using the CurrPorts Tool
  • Exploring and Auditing a Network Using Nmap
  • Scanning a Network Using the NetScan Tools Pro
  • Drawing Network Diagrams Using LANSurveyor
  • Mapping a Network Using the Friendly Pinger
  • Auditing Scanning by using Global Network Inventory
  • Basic Network Troubleshooting Using the MegaPing
  • Scanning the Network Using the Colasoft Packet Builder
  • Scanning Devices in a Network using The Dude

The Virtual Private Cloud for this Lab set utilizes:


Ethical Hacking Exercises are available as part of the following subscription:

CEHproductimage

Each subscription provides 6 months access to over 75 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflow
  • Cryptography
Price: $199
Add to Cart
View Cart