The Topology Discovery Part 1 module provides you with the instructions and devices to develop your hands-on skills in the following topics.

  • Basic Scanning
  • Discovering Network Topologies
  • Topology Discovery against Firewalls
  • Lab time: It will take approximately 1 hour to complete this lab.

Exam Objectives

The following exam objectives are covered in this lab:

  • CS0-001 1.1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
  • CS0-001 1.2: Given a scenario, analyze the results of a network reconnaissance

Exercise 1 - Basic Scanning

Host Scanning is one of the first steps in network reconnaissance used to reduce a set of IP ranges into a list of active or interesting hosts. Network administrators may only be interested in hosts running a certain service, while security auditors may care about every single device with an IP address. Administrator’s may be comfortable using an ICMP ping to locate hosts on the internal network, while an external penetration tester may use a diverse set of probes to evade firewall restrictions as a ping scan itself covers more than ICMP echo requests.

In this exercise you will complete the following tasks:

  • Connect to your lab devices
  • Show host interfaces and routes
  • Scan a single host/IP address
  • Scan a range and subnet
  • Scan a range excluding hosts/networks

Exercise 2 - Discovering Network Topologies

Discovering the topology of a network helps to display what devices are active or in fact inactive. An Analyst uses this process of discovering information about network devices and their interconnections to create a topology map that displays how the devices in the network are connected. This helps to monitor the network and ensure that the network is functioning effectively. You can identify weaknesses in the network infrastructure, such as bottlenecks and failures within a network, and isolate problem areas when you are troubleshooting network problems.

In this exercise you will complete the following tasks:

  • Host discovery using ping scan
  • Port State
  • Display open ports only
  • Scan specific ports
  • Tracenet to device

Exercise 3 - Topology Discovery against Firewalls

Firewalls are often used to block or not respond to Ping requests, using a basic ping scan will not return a positive “up” result, even though the device actually exists. Therefore, we can use other types of scanning techniques to receive an acknowledgment from a device which is behind a firewall.

In this exercise you will complete the following tasks:

  • Identify and scan a firewall protected host
  • Scan with TCP SYN, ACK Ping
  • Scan with UDP Ping

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.