![zenmap topology zenmap topology](https://nmap.org/book/images/zenmap-fig-topology-fill.png)
![zenmap topology zenmap topology](https://linuxhint.com/wp-content/uploads/2020/02/14-8.png)
Used as part of NetBIOS over TCP protocol. NBNS = NetBIOS Name Service sometimes called WINS. I couldn’t find what the browser protocol was, but: Wireshark was capturing a mixture of packets using the Browser, NBNS, LLMNR and ICMP protocols. Then I shut down both file explorer and command prompt and returned to the rogue and to Wireshark. On the client I browsed the servers resources through file explorer, accessed the server through Internet Explorer and then I pinged the rogue too. I set Wireshark to start capturing IP packets, click start and then switch to the client. I started by opening Wireshark, then opening Wireshark’s Capture Options. Each one can be selected and show you the status of that service type. This could very easily highlight to a potential attacker key entry points into a vulnerable system.įinally, I looked at the services tab, which instead of showing us the host computers, Zenmap displays a list of services. Leading on from before, when we then look at the ports and hosts tab, we can see what ports are open on the individual hosts. I thought an interesting component was that Zenmap provide a few visual cues, such as on the one host, there is a picture of a bomb, indicating lots of open ports, while by contrast the other hosts had pictures of safes. Here, Zenmap tried to provide the most accurate information it can about each detected machine. With the scan completed, I could view the topology tab, showing what Zenmap had detected.įrom there I looked at the host details tab. While I didn’t see this, I believe this to be the end of the scan. The tutorial indicated that at the end of the scan, one would see a Nmap done message. Below Zenmap is in the middle of the scan. I’ve entered 10.1.0.0/24 into the target box and clicked scan. I booted the server, followed by the client and rogue, then I have gone into the rogue and opened Zenmap. With the gold snapshots still in place, I have started the labs.