Zenmap

In: Computers and Technology

Submitted By nimthunder
Words 251
Pages 2
Zenmap
Specs
* Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap
Who’s it for?
Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not.
What problem does it solve?
There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network.
Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan results…...

Similar Documents

Form

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: ITSY 1400 Information Systems Security Fundamentals student Name: Leo R Wilson II Instructor Name: Stephanie Jones Lab due date: December 8, 2013 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the......

Words: 588 - Pages: 3

Lab1

...Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview Hackers typically follow a fi ve-step approach to seek out and destroy targeted hosts. The fi rst step in performing an attack is to plan the attack by identifying the target and learning as much as possible about the target. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, students planned an attack on 172.30.0.0/24 where the VM server farm resides. Using Zenmap GUI, students then performed a “Ping Scan” or “Quick Scan” on the targeted IP subnetwork. Lab Assessment Questions & Answers 1. Name at least fi ve applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N 1. ❑ Yes ❑ No 2. ❑ Yes ❑ No 3. ❑ Yes ❑ No 4. ❑ Yes ❑ No 5. ❑ Yes ❑ No 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? LAB #1 – ASSESSMENT WORKSHEET Assessment Worksheet 15 3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If......

Words: 440 - Pages: 2

Zenmap Gui (Nmap)

...the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? Yes. Four packets. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? TargetWindows01 has Min = 0ms, Max = 0ms, Avg. =0ms. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap-T4-A-v-PE.-P522,25,80 –PA21,23,80,3389.172.30.0.0124 6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans.1 a. Quick Scan b. Quick Scan Plus c. Quick Traceroute d. Regular Scan e. Slow comprehensive scan 7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. I found six different test performed. APR scan, SYN Stealth Scan, Service Scan, OS detection, Nmap Scan. 8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address. The Service Scan and PRCGrind Scan scanned services on the IP......

Words: 350 - Pages: 2

Cis 333 Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAB #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: CIS 333 Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about the target. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, students planned an attack on 172.30.0.0/24 where the VM server farm resides. Using Zenmap GUI, students then performed a “Ping Scan” or “Quick Scan” on the targeted IP subnetwork. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. WINDOWS APPLICATION LOADED STARTS AS SERVICE Y/N Server Tenable Network Security 2. service edition 4. Citrix tools 5.WireShark 3. Tftpd32 1.FileZilla x Yes x Yes xYes xYes Yes No No No No xNo 2. What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway...

Words: 560 - Pages: 3

Computer Science

... 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the allocated source......

Words: 467 - Pages: 2

Labs

...and Reconnaissance Probing Using Zenmap GUI (Nmap) LAB #3 – ASSESSMENT WORKSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many......

Words: 303 - Pages: 2

Perform Reconnaissance and Probing Using Zenmap Gui (Nmap) Using Zenmap Gui (Nmap)

...Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No Splunk Zenmap Nessus OpenOffice Wireshark 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2.......

Words: 888 - Pages: 4

Network Security

...and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many......

Words: 303 - Pages: 2

Lab 1

... 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the allocated source......

Words: 467 - Pages: 2

Sfafdsafd

...and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many......

Words: 303 - Pages: 2

Css200

...Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Principles of Network Security / CSS200-1401B-01 Student Name: Jason Ortiz Instructor Name: Gregory Roby Lab Due Date: 3/3/14 Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network......

Words: 317 - Pages: 2

Firewall

...Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 5. How many total IP hosts (not counting Cisco device interfaces) did Zenmap GUI (Nmap) find......

Words: 303 - Pages: 2

Css 150 Lab

... 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the allocated source......

Words: 467 - Pages: 2

Looking

...and Reconnaissance Probing Using Zenmap GUI (Nmap) Lab #3 – aSSESSMENT WORkSHEET Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you used the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application to perform network discovery and security scans. After the initial IP network reconnaissance task, you identified the IP hosts, servers, operating systems, and applications. You identified the risks, threats, and vulnerabilities within the IT infrastructure. This utility is essential for information systems security practitioners to perform routine tasks, such as taking network inventory, managing service upgrade schedules, and monitoring host or service uptime. Lab Assessment Questions & Answers 1. What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity? Assessment Worksheet 2. Explain both the information systems security practitioner and hacker perspectives of using a security 37 scanning application such as Zenmap GUI (Nmap). 3. How many tests did your Intense Scan definition perform? List them all after reviewing the scan report. 4. Describe what each of these tests displays within the Zenmap GUI (Nmap) scan report. 3 Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) 5. How many......

Words: 303 - Pages: 2

Network Discovery and Reconnaissance Probing Using Zenmap Gui (Nmap) Chart #2

...Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap GUI (Nmap) Chart #2Network Discovery and Reconnaissance Probing Using Zenmap......

Words: 431 - Pages: 2

El Hazard 2 The Magnificent World Episode 2 English Dubbed | Recent Searches | Tv Led 32 Pollici Blue 32Bl600 Smart Tv - Italia