Performing Reconnaissance from the WAN
Outcomes addressed in this activity:
Analyze the methods ethical hackers use to perform reconnaissance and social engineering.
In this lab, you will perform reconnaissance from the wide area network. The purpose of this lab is to show you how you can use Nmap to identify open ports and Netcat and telnet for banner grabbing. You will then learn how to use an exploit framework like Metasploit® to get access to the password file, and use a password cracking tool like John the Ripper® to crack the password, and then login using admin access.
Part 1:
Complete the lab âPerforming Reconnaissance from the WAN.â In the lab environment, you will find step-by-step instructions. As you work through the lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture
Part 2:
After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
Place your work from Part 1 and Part 2 into a Microsoft Word document. Support any assertions made with credible sources using APA style formatting.
For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.