CYB – Project 3

Use our book as a main reference: Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration

testing made easy (2nd ed.). Waltham, MA: Elsevier. .
Chapters to use
• Chapter 3: Scanning
Unit III Project Nmap and Nessus Scanning Assignment
Nmap:
Using the listed scans below, use Nmap to retrieve port information from your target. Scan the first 1,000 ports, retrieve version

information, and identify the Operating System with all the scans when possible.
• TCP Connect Scan
• SYN Scan
• UDP Scan
• Xmas tree Scan
• Null Scan Take a screen shot of each step.
Nessus: Using Nessus, create a scan that scans the same hosts as the Nmap exercise. Take a screen shot of your results.

TAKE ADVANTAGE OF OUR PROMOTIONAL DISCOUNT DISPLAYED ON THE WEBSITE AND GET A DISCOUNT FOR YOUR PAPER NOW!

READ ALSO :   Sid & Nancy (1986) (about Sid Vicious)