Preparing a mini-project (Report on network scanning & threat report)
π‘️ Mini Project
π‘ Network Scanning & Threat Analysis Report
1️⃣ Project Title π
Network Scanning and Threat Assessment of a Sample Lab Network
2️⃣ Objective π―
-
To perform network scanning on a test environment
-
To identify open ports and running services
-
To detect potential vulnerabilities
-
To prepare a structured threat analysis report
3️⃣ Tools Used π ️
-
Nmap π – Network discovery & port scanning
-
Wireshark π‘ – Packet analysis
-
VirtualBox π₯️ – Lab setup
-
Optional: OWASP ZAP π·️ – Web vulnerability scanning
4️⃣ Lab Setup π§ͺ
Environment:
-
Host Machine (Windows/Linux) π»
-
Virtual Machine (Kali Linux / Ubuntu) π§
-
Test Target Machine (Metasploitable or local server) π―
Network Type:
-
Internal Network / NAT (Safe Lab Mode) π
⚠️ All testing performed in authorized lab environment.
5️⃣ Methodology π
Step 1: Network Discovery π°️
Command:
nmap -sn 192.168.1.0/24
Purpose:
-
Identify active devices in the network
Step 2: Port Scanning πͺ
Command:
nmap -sS -p- 192.168.1.10
Purpose:
-
Identify open ports
-
Detect exposed services
Step 3: Service & Version Detection π
Command:
nmap -sV 192.168.1.10
Purpose:
-
Identify software versions
-
Detect outdated services
Step 4: OS Detection π»
Command:
nmap -O 192.168.1.10
Purpose:
-
Identify operating system
Step 5: Packet Analysis π‘
Using Wireshark:
-
Capture traffic during scan
-
Analyze TCP handshake
-
Observe suspicious traffic
6️⃣ Sample Findings π
| Port | Service | Risk Level | Description |
|---|---|---|---|
| 22 | SSH | Medium ⚠️ | Remote login service |
| 80 | HTTP | High π₯ | Unencrypted web traffic |
| 3306 | MySQL | High π₯ | Database exposed to network |
7️⃣ Threat Analysis π¨
π΄ High Risk
-
Open database port (3306) accessible externally
-
HTTP running without HTTPS
Impact:
-
Data leakage π₯
-
Credential theft π
π‘ Medium Risk
-
SSH open with weak password policy
Impact:
-
Brute-force attack possibility π£
8️⃣ Recommendations π‘️
✅ Close unused ports
✅ Implement firewall rules
✅ Enforce strong passwords
✅ Enable HTTPS (SSL/TLS) π
✅ Restrict database access to internal IP only
✅ Regular vulnerability scanning
9️⃣ Conclusion π
The network scan identified multiple open services, including high-risk exposures.
Proper firewall configuration, encryption, and access control policies are required to reduce attack surface.
Regular security assessments improve overall network security posture. π‘️π
π Future Improvements π
-
Implement IDS/IPS
-
Perform vulnerability scanning
-
Conduct penetration testing
-
Continuous monitoring
Comments
Post a Comment