experiment one

People's Public Security University of China

Chinese people public security university

 

cyber countermeasures

experimental report

 

experiment one

Network Reconnaissance and Network Scanning

 

 

 

student name

Qiao Haotian

grade

 15

District team

one 

mentor

Takami 

 

 

School of Information Technology and Cyber ​​Security

July 7 , 2017 _ _

 

General outline of experimental tasks

20 17 —20 18th  semester 1st  semester  _ 

1. The purpose of the experiment

1. Deepen and digest the teaching content of this course, and review the Internet search skills, methods and techniques learned;

2. Understand and be familiar with Internet resources such as common search engines, scanning tools, social networking sites, etc., to search, associate and analyze a given task;

3. To achieve the purpose of consolidating course knowledge and practical application.

2. Experimental requirements

1. Carefully read the content of each experiment. For topics that require screenshots, clear screenshots should be taken and the screenshots should be marked and explained.

2. The document requires a clear structure, accurate graphic and textual expression, and standardized labeling. The reasoning content is objective, reasonable and logical.

3. Software tools can use office2003 or 2007, Nmap, etc.

4. After the experiment is over, keep the electronic documentation.

3. Experimental steps

1. Prepare

Prepare for the experiment in advance. Before the experiment, you should have a detailed understanding of the experimental purpose, experimental requirements and experimental content, be familiar with and prepare the software tools for the experiment, and prepare the experimental content in advance according to the experimental content and requirements.

2. lab environment

Describe the hardware and software environment (including various software tools) used in the experiment;

Power on and start the software office2003 or 2007, browser, scanning software.

3. experiment procedure

1) Start the system and start the tool software environment.

2) Use software tools to realize the experimental content.

4. experimental report

Write the experimental report according to the unified required experimental report format. Embed the document written according to the template format into the experimental report document, the document should be written according to the prescribed writing format, and the tables should have tables and graphs and pictures.

 

 

 

 

 

 

Experimental task (1)

Network reconnaissance refers to all the detection activities of the target host before or during the attack by hackers in order to carry out the attack more effectively. Network reconnaissance is also sometimes referred to as "spotting". Usually "stepping points" include the following: the domain name, IP address, operating system type of the target host, which ports are opened, and what applications are running behind these ports, and whether these applications have vulnerabilities, etc. So how do you collect information? Technology-agnostic "social engineering," search engines, and scanning tools can be leveraged.

 

Question one:

 

Use Baidu or Google to search www.ppsuc.edu.cn for all web pages containing "Internet Security". (with screenshot)

 

 

 

 

Question two:

 

Use Baidu or Google to search for all pdf documents containing "Internet Security" (with screenshots)

 

 

 

 

 

 

 

 

Question three:

 

Xiaoli is an undergraduate student majoring in pharmacy. She is now working in the major of pharmacy. Currently, she wants to obtain a qualification certificate, but the registration conditions require her to work for three years. So, what kind of certificate does Xiaoli want to get? (Please answer and attach screenshots to prove it.)

 

 

 

 

 

 

 

 

Question four:

 

June 28 is Xiao Wang's birthday, he is an undergraduate student admitted to the People's Public Security University of China in 2008. In his senior year, in order to celebrate his birthday, he and his friends watched a domestic fantasy movie that happened to be released on the birthday. In this movie, the actor who played the role of "Alchemy Master" once became a monk. What was his dharma name at that time? (with screenshot)

 

 

 

 

 

 

Question five:

 

210.31.48.31, which unit does this IP address belong to (screenshot attached)

 

 

 

 

 

Question six:

 

In one case, a MAC address of the suspect was obtained: 40-16-9F-4E-7F-B4, please check the manufacturer corresponding to the MAC address (screenshot attached)

 

 

 

 

 

Question seven:

 

In one case, the suspect's LAC is 41064 and CID is 16811, where might this person be? (with screenshot)

 

 

 

 

 

 

Question eight:

 

When obtaining www.zzz.gov.cn domain name registration, the email address of the registrant is (screenshot attached)

 

 

 

 

 

 

 

 

Question nine:

 

Expand relevant clues from the Internet through a person's QQ number. Such as network nickname, MSN number and other information.

 

You can also choose an online virtual identity (QQ, Mail, Tel) and obtain other relevant information of the virtual identity through Internet search. (Please explain the reasoning process and attach a screenshot of the search)

 

For example: Nickname->E-mail->QQ Number->Phone, Name->WeChat->Physical Address......................

 

 

 

 

 

 

 

Question ten:

 

Please query the IP address and subnet mask of the machine, and scan all surviving hosts in this network segment in the LAN (search screenshots are attached)

 

 

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325124513&siteId=291194637