Professional Documents
Culture Documents
Report
Report
Team Members
ACKNOWLEDGEMENT REPORT
The information provided in the document is gathered by the proper research and observation.
The mentioned details are verified by the following people.
Contents
Scope of network........................................................................................................................................4
Networking equipment:..............................................................................................................................4
Cables......................................................................................................................................................4
Switch......................................................................................................................................................4
Server......................................................................................................................................................4
Description of performance and capabilities...............................................................................................4
Bandwidth...............................................................................................................................................4
Capacity...................................................................................................................................................4
Network.......................................................................................................................................................4
Fiber Port Specifications..........................................................................................................................4
Features of Catalyst 2750........................................................................................................................5
Topology:.....................................................................................................................................................5
Nodes:.........................................................................................................................................................5
Plug Points:..................................................................................................................................................5
Lan Connectors:...........................................................................................................................................5
WiFi Access Points:......................................................................................................................................5
Desktops:.....................................................................................................................................................6
Servers:........................................................................................................................................................6
Printers:.......................................................................................................................................................6
Switches:.....................................................................................................................................................6
Scanners:.....................................................................................................................................................6
Routers:.......................................................................................................................................................6
Infrastructure:.............................................................................................................................................6
Computers based on OS:.............................................................................................................................6
Software:.....................................................................................................................................................7
MAC Addresses:...........................................................................................................................................7
NMAP:.........................................................................................................................................................9
NESSUS:.....................................................................................................................................................19
Vulnerability Scanner................................................................................................................................20
Ntop.......................................................................................................................................................20
Comparison Report...................................................................................................................................23
RATING......................................................................................................................................................23
Networking equipment:
Cables
• Optical Fiber for ISP
• CAT5
• Ethernet LAN
Switch
• CISCO
Server
INTEL Processor (Xeon)
Capacity
• 24 X 3 Ports (1 – lab)
Network
Internet Service Provider (ISP) – RailTel Corporation
Data Transfer Rate: 10Mbps Ethernet, 100Mbps Fast Ethernet, 1Gbps Gigabit Ethernet
Topology:
The systems in the lab are connected with the star bus topology. The main server is situated in one room
and the connections from the server to the all other systems.
Nodes:
Node in the Lan network should consists of MAC address where as in the internet it should consists of
IP address. The no. of nodes in the lab is 37 that have MAC address or IP address.
Plug Points:
The 150 power plug points are present in J4 lab.
Lan Connectors:
The lan connectors are in total in the lab are 50. But the switch is present in the lab which consists of 10
connectors.
Desktops:
The no. of desktops in the lab are two.
Servers:
There are no servers present in the lab.
Printers:
No printers are situated in the lab.
Switches:
One switch is located in the lab which consists of 10 connections.
Scanners:
No scanners are present in the lab.
Routers:
The total LAN is connected to the single router.
Infrastructure:
Software:
Software Version
MS Office 2010 Beta
MS Office 2007 12.0.4518.1014
Edit plus 3
VLC Player 1.1.4
Internet Download Manager 5.19 Build 3
Net beans IDE 6.8
Google talk Beta
Skype 4.1.0.178
Mysql 5.0
Nero 7,8,10
Win Rar 3.12
Kaspersky workstations 8.0
Sound forge pro 10.0
Dev Cpp 4.9.9.2
Total video converter 3.1.2
MAC Addresses:
Acer Laptop 172.16.3.124 00-26-22-4F-C2-C8 "windows XP, fedora" Rocky "2007, open
office(Linux)" kaspersky2011 "Firefox, IE"
NMAP:
Nmap is basically used for port scanning, OS detection, intense scan, depth scan, topology, host details
and more. The basic things we observed using this tool is we can find the ports that are in use, closed,
opened, filtered, unfiltered, opened|filtered, closed|filtered.
Quick traceroute
nmap 209.85.231.104
nmap -sS -sU -T4 -A -v -PE -PP -PS21,22,23,25,80,113,31339 -PA80,113,443,10042 -PO --script all
209.85.231.104
NESSUS:
Nessus primary function is to provide security and functioning as vulnerability scanner.
Network administrators and security professionals use Nmap to map out their networks, as well as to
determine:
• Status of a host
Nessus is designed to scan systems to determine their vulnerabilities. Some vulnerability checks, if safe
mode is disabled, can crash a system! As such, administrators expose a system to the scans prior to
putting them in production.
• Security audits
• Asset profiling
• Vulnerability analysis
Nmap by itself won't tell you the existence of vulnerabilities on a system. Between the scanning results,
your knowledge of computer networking, and your knowledge of your network baseline, you may be
able to figure out what vulnerabilities exist, address these issues, and improve your security posture.
Nessus is really a different class of tool compared to Nmap. It is more of an enterprise scanner. Nessus
uses a web interface for its user interface, and it allows the Nessus administrator to create multiple
users. The one interesting thing about Nessus is the ability to create policies which are composed of
scanning specifications--to include what security plugins are to be used, the types of ports to scan, any
credentials that may be needed, and so on.
A scan can then be created using that policy. It is in scans where targets are specified. Through the user
interface, one can view scan results even as the scan is in progress. Reports are generated in various
formats. This complete approach to vulnerability scanning puts Nessus on a higher level than Nmap.
When we scanned the entire lab by using both the port scanner using Nmap and vulnerability scanner
using Nessus we observed the following details and we rated the networking how secure it is and how to
we solve the problems in the network.
Vulnerability Scanner
Ntop
Traffic analyser
Packet statistics
Protocol distribution
Network Inventory Management Page 22
Network Security
Comparison Report
The user PRASANNA – PC was having windows 7 ultimate operating system and the opened ports are
135, 139, 445 and 3306. The user contains installed Mysql 5.0.18 using protocol 10. The user was
located in the local lan.
The user was having threats with high vulnerability with the number of 10, medium 5 and low 2. The
high vulnerabilities consists of Mysql problem, the medium problems are with services of xampp.
RATING
After observing all the scanning Reports in the network we come to an conclusion by looking its
available fixes and reducing vulnerability consequences we can rate the network of J4 with 7 out of 10.
The considerations for this rating are physical devices, equipments and its configurations, vulnerabilities
for the user systems its patches and the possible solutions for securing the network by preventing with
the available sources.