In this lab, we will be using network discovery tools. You may install these tools on nmshost, a Windows machine attached to the lab network private LAN, or a Mac attached to the lab network private LAN for this lab.
Install the nmap command line tool, as well as a GUI for it. You may use any nmap GUI tool you like. zenmap is popular and may be obtained from the nmap.org website. If the computer you will be using for this lab already has nmap, you do not need to reinstall it.
You can read about half of the nmap ebook on the nmap.org website. It will provide you with a reference for the tools and examples of using it for network discovery. The full book is available for purchase, but we do not need the full book for our lab.
We are going to review the various techniques for doing network discovery using nmap. nmap can be used to go much deeper into specific hosts and services than we do in this lab. Our primary purpose is to determine what is on our network. Our test machine is connected to multiple networks, and it is important to not do any intrusive scanning of networks which do not belong to us. So be very careful with what scans you run against which networks.
hostname -i
.
nmap -sn `hostname -i`/24
sudo nmap -sn `hostname -i`/24
Did you get a different result from scanning with sudo?
curl icanhazip.com
. Since we do not necessarily know what subnet mask our ISP is using, you can try it with a 24 bit mask to see how it works.
nmap -sn `curl icanhazip.com`/24
sudo nmap -sn `curl icanhazip.com`/24
Did you get a different result from scanning with sudo? From the two different networks scanned, do you notice anything about the extra hosts that likely showed up when using sudo that might give you hints about why you needed sudo to discover them? If not, review the section in the nmap ebook regarding host discovery controls.
nmap -sn zonzorp.net/23
From the result of the scan, what can you say about the network that zonzorp.net is attached to?
We can do some simple discovery on our network using wireshark/tshark. You can use either tool, as you choose.
Screenshot the reports from wireshark/tshark, and add your own comments to describe the results. Did you see any unexpected hosts, protocols, or connections?
Paessler offers commercial monitoring services and software. Their PRTG product can be run in trial mode and has a free use license for small networks. As part of the installation, it can do network discovery by running probes and various agent programs.
To see what automated discovery can look like, we will install PRTG and allow it to run a discovery on our network.
There is nothing to submit for PRTG, it is simply to experience the difference using commercially-funded software can make in the user-friendliness of these kinds of tools.
This lab is graded and counts towards your semester mark. Submit the questions found above with your answers as a PDF. DO NOT submit a Word document. Only PDFs will be accpeted.