Premium Essay

7 It Scan

In: Business and Management

Submitted By illusionist660
Words 383
Pages 2
Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-24 09:18 Pacific Daylight Time

Nmap scan report for 172.30.0.7

mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers

Host is up (0.0021s latency).

Not shown: 998 closed ports

PORT STATE SERVICE

22/tcp open ssh

3389/tcp open ms-wbt-server

MAC Address: 3E:9A:1D:B4:13:EC (Unknown)

Nmap scan report for 172.30.0.11

Host is up (0.0014s latency).

Not shown: 996 closed ports

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

111/tcp open rpcbind

3389/tcp open ms-wbt-server

MAC Address: 16:E2:17:DC:4A:97 (Unknown)

Nmap scan report for 172.30.0.12

Host is up (0.0085s latency).

Not shown: 996 closed ports

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

111/tcp open rpcbind

3389/tcp open ms-wbt-server

MAC Address: C6:D4:FE:37:EA:7A (Unknown)

Nmap scan report for 172.30.0.15

Host is up (0.014s latency).

Not shown: 980 closed ports

PORT STATE SERVICE

21/tcp open ftp

53/tcp open domain

88/tcp open kerberos-sec

135/tcp open msrpc

389/tcp open ldap

445/tcp open microsoft-ds

464/tcp open kpasswd5

593/tcp open http-rpc-epmap

636/tcp open ldapssl

3268/tcp open globalcatLDAP

3269/tcp open globalcatLDAPssl

3389/tcp open ms-wbt-server

49152/tcp open unknown

49153/tcp open unknown

49154/tcp open unknown

49155/tcp open unknown

49157/tcp open unknown

49158/tcp open unknown

49159/tcp open unknown

49176/tcp open unknown

MAC Address: 2E:DD:91:A7:19:6C (Unknown)

Nmap scan report for 172.30.0.17

Host is up (0.014s latency).

Not shown: 990 closed ports

PORT STATE SERVICE

135/tcp open...

Similar Documents

Free Essay

Instrumnt Profile

...Varian Cary Eclipse Spectrofluorometer: (Fluorescence, Phosphorescence, Chemiluminescence) Table of Contents: Chapter 1: Introduction…………………………………………………….3 a. General Characteristics…………………………………………...3 b. Signal Theory…………………………………………………….3/4 c. Sample Type……………………………………………………...5 d. Advantages……………………………………………………….5 e. Disadvantages/Limitations……………………………………….5 Chapter 2: Instrumentation………………………………………………....6 a. Block Diagram…………………………………………………...6/7 b. Internal Design…………………………………………………..6/7 c. External Design…………………………………………………6/7 Chapter 3: Operating Instructions………………………………………….8 a. Start Up/Shut Down…………………………………………......8 b. Precautions…………………………………………………….....8 c. Fluorescence Scan………………………………………………..9 d. Phosphorescence Scan…………………………………………..13 e. Chemiluminescence Scan………………………………………...11 Chapter 4: References……………………………………………………...15 Chapter 1: Introduction a. General Characteristics Varian has been supplying essential tools for scientists engaged in drug discovery, life science, genetic engineering, neuroscience studies, health care, environmental analysis, and academic applications for over 50 years. Cary has been associated with high performance spectrophotometers for over 50 years. The Cary Eclipse Fluorescence spectrophotometer fit well within the Cary range, offering the excellent specifications and modern software that has become the Cary standard. The Spectrophotometer was......

Words: 1825 - Pages: 8

Premium Essay

Environmental Factors

...hnotesScan to E-mail White Paper Ricoh Americas Corporation May 2007 Copyright 2007 – Ricoh Americas Corporation Scan to E-mail White Paper TABLE OF CONTENTS 1 1.2 2 3 4 4.1 4.2 4.3 4.4 4.5 4.6 4.7 5 5.1 5.2 6 6.1 6.2 6.3 7 7.1 7.2 8 8.1 INTRODUCTION....................................................................................................................4 Target Audience ..................................................................................................................4 MODEL CROSS REFERENCE .............................................................................................5 SETTING/SPECS ..................................................................................................................7 SETTING UP SCAN TO E-MAIL VIA WEB IMAGE MONITOR ............................................7 Web Image Monitor Administrator Login Process...............................................................7 Network Settings via WIM...................................................................................................9 SMTP Authentication via WIM ..........................................................................................10 POP before SMTP Configuration via WIM........................................................................ 11 LDAP Settings in WIM ...................................................................................................... 11 Address Book Settings in WIM .......................

Words: 5530 - Pages: 23

Premium Essay

Send

...Created by Applications Etc. Revised July 7, 2011 Applications Etc. Recommended PC Maintenance Applications Etc. over the years we have recommended various tools to clean up and maintain your PC’s. We strive to let our clients know which tools and download locations are, but with periodic changes in the web, remembering the web sites locations for multiple tools can be challenging. So we have consolidated links to those tools for your convenience. This document is divided into multiple sections in order to describe the recommendations and use of the tools you should use. The first section, PC Maintenance Tools & Icon Descriptions explains the tools that Applications Etc. recommends using on a regular basis to prevent many major problems. The second section, PC Maintenance Tools & Icons Installation explains the process to download and install the recommended tools and tailor to your environment. PC Maintenance Tools & Icon Descriptions  00 Download PC Maintenance Tools – This shortcut is to www.AEHOST.net for links to download the PC Maintenance Icons and Tools recommended. “Please note any vendor license restriction toward business and personal use.” 00 PC Maintenance Readme.pdf contains the Maintenance Tools & Icons Installation. 01 Disk Cleanup – Disk Cleanup is a Microsoft Windows Tool that helps cleanup the computers hard drive. Some of the locations that Disk Cleanup removes are Downloaded Program Files, Internet Temporary Files, Offline Web pages, Recycle Bin, Setup...

Words: 3537 - Pages: 15

Free Essay

Scanner Instructions

...LS4208 Product Reference Guide LS4208 Product Reference Guide 72E-69413-03 Revision A January 2007 © 2005-2007 by Symbol Technologies, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Symbol. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Symbol grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Symbol. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Symbol. The user agrees to maintain Symbol’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user......

Words: 35954 - Pages: 144

Free Essay

Cfhhg

...is in excess of that predicted by the Nernst equation. Cyclic voltammetry (CV) is perhaps the most versatile electro-analytical technique for the study of electroactive species. Its versatility dined with ease of measurement has resulted in extensive use of CV in the fields of electrochemistry, inorganic chemistry, organic chemistry and biochemistry. Cyclic voltammetry is often the first experiment performed in an electrochemical study of a compound, biological material, or an electrode surface. The effectiveness of CV results from its capability for rapidly observing the redox behavior over a wide potential range. The resulting voltammogram is analogous to a conventional spectrum in that it conveys information as a function of an energy scan. Instrumentation: The main components of a Cyclic Voltammeter are the Reference electrode, Auxillary electrode, Working electrode and Potentiostat. The Potentiostat is an instrument that controls the potential of the working electrode with respect to the reference electrode while also measuring the current flow between the working electrode and counter electrode. In CV, the potential of a working electrode is cycled linearly between two potential values at which the oxidation and...

Words: 2386 - Pages: 10

Free Essay

Css 200 Ip2-Lab

...CSS200-1401B-01 Principals of Network Security Instructor: Gregory Roby Phase 2, Individual Project Date: March 08, 2014 By: Gil Palacio Lab #3 Overview: In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab: I added several IPs to putty in order to build information or to give information to the GUI that I am looking into. I copy pasted the two interfaces that are up,up in the 1st question from the Lab Assessment sheet of the putty profile created: Interface Ethernet0/0 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9e, MTU not set IP address unassigned 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops ...

Words: 1306 - Pages: 6

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides the ability to monitor a network, host or application, and report back when suspicious activity is detected, but it does not block the activity. In this lab, you will configure Snort, an open source intrusion prevention and detection system, on the TargetSnort virtual machine and the Web-based IDS monitoring tool called Snorby. You also will use the OpenVAS scanning tool to scan the...

Words: 3209 - Pages: 13

Premium Essay

Business Management

...archive of this journal is available at www.emeraldinsight.com/1472-5967.htm Environmental scan: influence on strategic direction Environmental scan Donald Chrusciel Iowa State University, Ames, Iowa, USA Abstract Purpose – The purpose of this paper is to offer the environmental scan as a valued tool for the facilities management (FM) operation to assist in determining strategic direction. Design/methodology/approach – After defining the environmental scan, its usefulness is explored from the perspective of a single case study public institution FM organisation. Once the information is captured, the potential analysis and value is discussed. Findings – The environmental scan is seen as a valuable tool in the FM organisation to solicit input from both the institution’s administration and the customer community leaders. Through this analysis, the FM organisation can refine its strategic direction by determining what it is doing well, what it should investigate doing, and what it should consider to stop doing. Research limitations/implications – The single case study does raise the issue of generalisability. However, given the nature of what can be gained from qualitative research, the reader is cautioned to take into account appropriate logic and environmental factors when considering transferability. Practical implications – The findings from the FM environmental scan serves to not only aid in determining strategic direction but can also assist the FM......

Words: 4522 - Pages: 19

Premium Essay

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for 172.30.0.10 Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against 172.30.0.75 because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for 172.30.0.75 Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown......

Words: 1062 - Pages: 5

Free Essay

Students/Teacher

...Basics of PLC Programming Industrial Control Systems Fall 2006 Lecture – PLC Programming Basics MME 486 – Fall 2006 1 of 62 PLC Architecture Lecture – PLC Programming Basics MME 486 – Fall 2006 2 of 62 PLC System Lecture – PLC Programming Basics MME 486 – Fall 2006 3 of 62 Processor Memory Organization The memory of a PLC is organized by types. The memory space can be divided into two broad categories: program and data memory. Advanced ladder logic functions allow controllers to perform calculations, make decisions and do other complex tasks. Timers and counters are examples of ladder logic functions. They are more complex than basic inputs contacts and output coils and rely heavily upon data stored in the memory of the PLC. Lecture – PLC Programming Basics MME 486 – Fall 2006 4 of 62 Memory Map A memory map can be used to show how memory is organized in a PLC. § Input/output locations § Internal relay and timer/counter locations Data table User program The user program causes the controller to operate in a particular manner Housekeeping memory Used to carry out functions needed to make the processor operate (no access by user) Lecture – PLC Programming Basics MME 486 – Fall 2006 5 of 62 Program Files The user program will account for most of the memory of a PLC system. • Program files contain the logic controlling machine operation. Program file organization for......

Words: 3166 - Pages: 13

Premium Essay

Qefee

...pp. 607-625 Page Scan Article PDF Article Summary Journal *  2. The Killing of the Father: The Background of Freud's Group Psychology  Jaap van Ginneken Political Psychology, Vol. 5, No. 3 (Sep., 1984), pp. 391-414 Page Scan Article PDF Article Summary Journal *  3. The Secret Lives of Liberals and Conservatives: Personality Profiles, Interaction Styles, and the Things They Leave Behind  Dana R. Carney, John T. Jost, Samuel D. Gosling, Jeff Potter Political Psychology, Vol. 29, No. 6 (Dec., 2008), pp. 807-840 Page Scan Article PDF Article Summary Journal *  4. A Kohutian Analysis of President Bush's Personality and Style in the Persian Gulf Crisis  Robert H. Swansbrough Political Psychology, Vol. 15, No. 2 (Jun., 1994), pp. 227-276 Page Scan Article PDF Article Summary Journal *  5. Personality and Development in Childhood: A Person-Centered Approach  Daniel Hart, Robert Atkins, Suzanne Fegley, Richard W. Robins, Jessica L. Tracy Monographs of the Society for Research in Child Development, Vol. 68, No. 1, Personality and Development in Childhood: A Person-Centered Approach (2003), pp. i-iii+v+vii+1-122 Page Scan Article PDF Article Summary Journal *  6. Flight into Security: A New Approach and Measure of the Authoritarian Personality  Detlef Oesterreich Political Psychology, Vol. 26, No. 2, Special Issue: Authoritarianism (Apr., 2005), pp. 275-297 Page Scan Article PDF Article Summary Journal *  7. When Do......

Words: 2518 - Pages: 11

Premium Essay

Lab 5

...is the command line syntax for running an "Intense Scan" with Zenmap on a target subnet of 172.30.0.0/24? • nmap -T4 -A -v 3. Name at least five different scans that may be performed from the Zenmap GUI. Document under what circumstances you would choose to run those particular scans. • Quick Scan – You can use this to quickly determine information about the network. It is faster than regular scans because it limits the number of port it scans. General information gathering • Regular Scan – Great scan to just get back information on ports; nothing extra. • Ping Scan – This will find any targets that are up. Make sure target machines are up and responding. • Slow Comprehensive Scan - It is slow but it will give you more information that all of the scans. It includes every port UDP and TCP. Plus you can enable different switches like operating system detection. This is an intrusive scan, so I guess if you where enumerating and trying to find out information about the network, you would use this. • Intense Scan – This is like the comprehensive scan. The intense scan is slow but not as slow as comprehensive. You can still run switches like operating system detection and version detection. 4. How many different tests (i.e., scripts) did your "Intense Scan" definition perform? List them all after reviewing the scan report. • It loaded 36 scripts, but I only saw a few performed. APR scan, SYN Stealth Scan, Service Scan, OS detection 5. Describe what each of these......

Words: 424 - Pages: 2

Premium Essay

Tech

...This is a guide on how to use Microsoft Baseline Security Analyzer (MBSA) for a security audit in Ken 7 Windows Limited. The first step is to Google “Microsoft Baseline Security Analyzer,” and begin to download and save it to your computer, after it is has been downloaded and saved then begin to install the MBSA tool on your computer infrastructure. The next step is to open MBSA by selecting the start button then choosing Microsoft Baseline Security Analyzer. The next step is to choose what scan you would like to do, so you can select “scan a computer,” to scan one computer or select scan multiple computers to scan more than one computer on the network. If you have chosen to scan one computer then you can either enter a computer name or IP address. If you are choosing to scan two or more computers than you can enter a domain name or a range of IP addresses. Next is to select the checkboxes next to the desired scanning options, in most situations it is good best to leave all the options checked for the most extensive scan and then start the scan to begin the scanning process. Once the scan is finished, then examine the results to see vulnerabilities have been discovered on your network. Address the vulnerabilities by download the necessary updates and patches to help in decreasing the vulnerabilities on the network and my sure to document enter step that was taken in correcting the vulnerability on the...

Words: 254 - Pages: 2

Free Essay

Lab 1 Security and Fundamentals Lab

...echo-request with an icmp echo-reply packet when you iniated the ping command at your dos prompt? If yes how many icmp echo-request packets were sent back to the ip source? Yes 12 3 host 4.If you ping the windows target 01 vm server and the Ubuntu target 01 vm server which fields in the icmp echo-request/ echo-replies vary? Ttl is 128.64 5. what is the command line syntax for running an intense scan with zen map on a target subnet of 172.30.0.0/24 N map t4 a v pe ps22,25,80 - pa21,23,80,3389, 172.30.0.0/24 6. name at least 5 different scans that may be performed from the zenmap gui and document under what circumstances you would choose to run those particular scans. Intense scans scans the network in depth, Ping scans to see if ping worked Quick scan scans the network quickly Regular scan scans the network regularly Quick traceroute scans hops quickly 7. how many different tests ie scripts did your intense scan definition perform list them all after reviewing the...

Words: 369 - Pages: 2

Premium Essay

Information Tecnology

...the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? A. Yes, 4 4. If you ping the “WindowsTarget01” VM server and the “UbuntuTarget01” VM server, which fields in the ICMP echo-request / echo-replies vary? A. The TTL on Windows was 128 while on Ubuntu the TTL was 64 5. What is the command line syntax for running an “Intense Scan” with ZenMap on a target subnet of 172.30.0.0/24? A. Nmap –T4 –A –V –PE –PS22, 25, 80 –PA21, 23, 80, 3389 10.96.109.30 6. Name at least 5 different scans that may be performed from the ZenMap GUI and document under what circumstances you would choose to run those particular scans. A. Ping Scan Quick Scan Intense Scan Regular Scan Intense Scan, No Ping 7. How many different tests (i.e., scripts) did your “Intense Scan” definition perform? List them all after reviewing the scan report. A.36 1.Nbstat 2. Smb-os-discovery 3. Smbv2-enabled 8. Describe what each of these tests or scripts performs within the ZenMap GUI (Nmap) scan report. A. 1....

Words: 407 - Pages: 2