Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
72 views9 pages

Ethical Hacking Lab Guide

The document is an assignment on ethical hacking focused on finding sweep IP ranges for live hosts. It covers key concepts such as latency, nmap, and subnet masking, along with various scanning techniques for identifying live systems and open ports on a network. The assignment includes practical methods for discovering live hosts using ICMP packets and other tools.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views9 pages

Ethical Hacking Lab Guide

The document is an assignment on ethical hacking focused on finding sweep IP ranges for live hosts. It covers key concepts such as latency, nmap, and subnet masking, along with various scanning techniques for identifying live systems and open ports on a network. The assignment includes practical methods for discovering live hosts using ICMP packets and other tools.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Ethical Hacking Lab Assignment - 2

Rachit Patekar | TY CSE-CSF | Roll No. 33 | PRN: 1032222764

Title: Find sweep IP ranges for live hosts.

Theory:

● Define Latency.
Latency refers to the time delay between the initiation of an action and its completion. In
networking, latency is the time taken for data to travel from the source to the destination across a
network. It is usually measured in milliseconds (ms). Factors affecting latency include the
physical distance between devices, network congestion, and the processing time at each hop
along the route.

● Meaning of nmap.
Nmap stands for Network mapper. It is a free and open-source tool used for network discovery
and security auditing. It is primarily used to discover hosts and services on a computer network
by sending packets and analyzing the responses. Nmap can be used to:

● Identify devices on a network.


● Detect open ports.
● Find vulnerabilities in networked systems.
● Perform network inventory management.
● Define Masking and Subnet Mask.
Masking refers to the technique used in IP networking to divide an IP address into network and
host portions. This is achieved through a subnet mask, which "masks" part of the IP address to
distinguish between the network and the host.

A subnet mask is a 32-bit number used in IP networking that helps to define the boundary
between the network and host portions of an IP address. It essentially tells routers and computers
which part of an IP address refers to the network and which part refers to the device (host) within
that network.

For example:

● IPv4 Subnet Mask: 255.255.255.0


○ Here, the first 24 bits (255.255.255) are the network part, and the remaining 8 bits
(0) are for the host.

Scanning an IP

Scanning a URL
Scanning a Range of IPs
Scanning IP Range using Subnet Mask

Scanning a port of a particular IP


Scanning a range of Ports of a Particular IP

Scanning 100 most common ports that can be open on a target.

Fragscan - Requires Root Privileges (Less latency, helps with quicker information
gathering). Scans all ports.
–top-port command

To discover all the live systems on the same subnet as our target machine.

Discovering Live Hosts by Sending ICMP echo packets to all of the subnet’s IP addresses.
Discovering Live Hosts by using ICMP Address Mask.
Discovering Live Hosts by using ICMP Timestamp.

You might also like