Question: Part 1: Scan the Domain Controller with Nmap (0/1 completed) Secure Labs on Demand was pleased with your penetration test findings and has requested you
Part 1: Scan the Domain Controller with Nmap (0/1 completed)
Secure Labs on Demand was pleased with your penetration test findings and has requested you conduct a similar test of their protected network. Specifically, they are hoping you can evaluate the security of one of their most critical systems: their domain controller. This domain controller is located in the Secure Labs on Demand data center, in the same rack as the web server you probed in Section 2. However, unlike the web server, which resides on the partially exposed DMZ network, this critical system is located on a separate internal LAN to which no public access is provided. Since you have been tasked with evaluating the security posture of this crucial system, you have been provided direct access to the network. Time to get started.
From the vWorkstation, use Nmap to scan the domain controller (labelled DomainController01 in the lab topology). Run your first scan with the Service Scan switch. Within the Nmap output, you should see an open port associated with the LDAP service. Next, run another scan with the Service Scan switch, but specify only the port corresponding to the LDAP service. If necessary, use the Internet to look up how to specify a single port in your Nmap command.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
