{"id":430,"date":"2025-04-27T20:45:32","date_gmt":"2025-04-27T20:45:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jb23435\/?page_id=430"},"modified":"2025-04-27T20:48:22","modified_gmt":"2025-04-27T20:48:22","slug":"active-reconnaissance-and-vulnerability-scanning-lab","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jb23435\/active-reconnaissance-and-vulnerability-scanning-lab\/","title":{"rendered":"Active Reconnaissance and Vulnerability Scanning Lab"},"content":{"rendered":"\n<p>Question 1: Active Scanning<br>\u2022 T1: Using both host and dig commands, demonstrate whether the host sdf.org is live or<br>not. Attach screenshots showing the results. <br>\u2022 T2: Perform DNS enumeration using dnsenum command for the host sdf.org. Check<br>whether the zone transfer is possible. Provide necessary screenshots. <br>\u2022 T3: Perform both ICMP Sweep and TCP Sweep for the host sdf.org using NMAP. Use the<br>option &#8211;reason to show the details and disable the arp-ping. Attach screenshots<br>showing the results. <br>\u2022 T4: Perform port scanning to determine all open ports and corresponding running<br>services for the host sdf.org. Attach screenshots showing the results.<br>Question 2: Vulnerability Scanning<br>\u2022 T1: Using NSE scripts, determine all known vulnerabilities present in the host sdf.org.<br>Attach a screenshot showing your command and the results you got.<br>\u2022 T2: Perform a brute force attack on sdf.org. You can choose any script from the<br>followings: ftp-brute, snmp-brute, http-brute, and oracle-brute. Attach screenshots<br>showing your command and the results you received. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Submission:<\/h2>\n\n\n\n<p>unable to provide<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question 1: Active Scanning\u2022 T1: Using both host and dig commands, demonstrate whether the host sdf.org is live ornot. Attach screenshots showing the results. \u2022 T2: Perform DNS enumeration using dnsenum command for the host sdf.org. Checkwhether the zone transfer is possible. Provide necessary screenshots. \u2022 T3: Perform both ICMP Sweep and TCP Sweep for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/active-reconnaissance-and-vulnerability-scanning-lab\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/430"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/430\/revisions"}],"predecessor-version":[{"id":444,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/pages\/430\/revisions\/444"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}