Question: Part 1: Scan the Domain Controller with Nmap (0/1 completed) Secure Labs on Demand was pleased with your penetration test findings and has requested you

Part 1: Scan the Domain Controller with Nmap (0/1 completed)

Secure Labs on Demand was pleased with your penetration test findings and has requested you conduct a similar test of their protected network. Specifically, they are hoping you can evaluate the security of one of their most critical systems: their domain controller. This domain controller is located in the Secure Labs on Demand data center, in the same rack as the web server you probed in Section 2. However, unlike the web server, which resides on the partially exposed DMZ network, this critical system is located on a separate internal LAN to which no public access is provided. Since you have been tasked with evaluating the security posture of this crucial system, you have been provided direct access to the network. Time to get started.

From the vWorkstation, use Nmap to scan the domain controller (labelled DomainController01 in the lab topology). Run your first scan with the Service Scan switch. Within the Nmap output, you should see an open port associated with the LDAP service. Next, run another scan with the Service Scan switch, but specify only the port corresponding to the LDAP service. If necessary, use the Internet to look up how to specify a single port in your Nmap command.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!