Nmap/Wireshark Discovery & Remediation Analysis
Name
Western Governor’s University
C844: Emerging Technologies in Cybersecurity
,Nmap/Wireshark Discovery & Remediation Analysis 2
A. Topology for network 192.168.27.0/24
After conducting multiple network scans using the Nmap utility on the 192.168.27.0/24 IP
address range, eleven active devices were discovered in the range 192.168.27.10 –
192.168.27.20. However, using more detailed scanning options, Nmap was only able to identify
nine of those devices with any degree of certainty.
1) Basic network scan
Scans of the individual devices using the -O switch, Nmap was able to detect the operating system
type and open ports on each device. The network contains three Windows servers, two windows
workstations, one Linux server, two Linux workstations, and a VPN access gateway.
192.168.27.10
o This machine is identified as having the Windows Server
2012 r2 operating system with open ports 135 (msrpc), 139
(netbios-ssn), 445 (microsoft-ds), 2179 (vmrdp), and 4152 –
4158 (unknown)
, Nmap/Wireshark Discovery & Remediation Analysis 3
2)192.168.27.10
192.168.27.11
o This machine is running the Windows Server 2016 operating system and is a
domain controller in the “vulnerable” domain and is also acting as the DNS
server. It has open ports 53 (DNS), 88 (Kerberos), 135 (msrpc), 139 (netbios-
ssn), 389 (ldap), 445 (microsoft-ds), 464 (kpasswd5), 593 ( http-rpc-epmap), 636
(ldapssl), 3268 (globalcatLDAP), 3269 (globalcatLDAPssl)
3) 192.168.27.11