Scanning and Enumeration

Anonymous
timer Asked: Mar 9th, 2019
account_balance_wallet $20

Question Description

A:

4–6 paragraphs

As you being to perform the network-mapping phase of the scenario, you have been asked what the difference between scanning and enumeration is.

Take this opportunity to discuss the following:

  • Describe the processes of scanning and enumeration.
  • What do they entail, and what is the desired outcome?
  • In addition, research and recommend at least 2 scanning and enumeration tools that your organization could use.

B:

2–4 pages

Now that you have an understanding about how the organization is set up (with respect to the network and system infrastructures), it is time to fill in the details and see what actually exists and what attack vectors are present. This assignment will have you review the network structure and identify the machines, including operating systems and running services on each. You will scan and enumerate the system in your organization.

Using a scanning and enumeration tool, identified or chosen and then installed from above, perform a scan against your home/personal machine or network, and supply the following information about your organization:

  • A description about the tool used to perform the scan
  • A list of identified target host(s) in your lab environment
  • What running services are detected on each (include version numbers if possible)
  • What the detected operating system of the servers is

Describe or list any information that you found odd or that you think the tool reported incorrectly.

Add a discussion about the attack framework and the identified system(s) information to your report.

Tutor Answer

ProfJamesmiller
School: Carnegie Mellon University

Hello, I have just completed the assignment. Please find attached. It has been nice working with u.

Scanning and Enumeration
Thesis statement: The security of information and assets is a very key point to every big and
small business enterprise especially in the modern world where there is global connectivity
and even worse cyber terrorism (Butterfield, 2014).
1. Introduction
2. Process of Enumeration
3. Process of scanning
4. Description of tool used in scan
5. List of identified targets host in my home environment
6. Running services detected on each scan conducted
7. Operating systems discovered and the attack framework identified
8. Conclusion


Running head: SCANNING AND ENUMERATION

Scanning and Enumeration
Institution Affiliation
Date

1

SCANNING AND ENUMERATION

2
Introduction

The security of information and assets is a very key point to every big and small business
enterprise especially in the modern world where there is global connectivity and even worse
cyber terrorism (Butterfield, 2014). This paper aims at discussing the process of scanning and
enumeration and go into details about what they both entail and what is the desired outcome of
both processes.
Part A
Process of Enumeration
Enumeration in the field of IT includes the process of extracting private information such
as user names, network resources, machines names and other related services in which all this
information collected is used in identifying weak points in systems and their securi...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors