Chapter 16 - 01 - Discuss Network Troubleshooting - 05_ocred_fax_ocred.pdf

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Troubleshooting Network Issues: Network...

Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Troubleshooting Network Issues: Network Path Cannot Be Found OQ The issue of “network path was not found” may arise for the following reasons: » The network connection does not exist ;.. '. ’ » The network security settings do not allow sharing " § | » The name of the computer with which the connection is to be established is too long » The connection of system is blocked by firewall or the antivirus software -Q——I CQ—»I O I Newokmor e——— (@ Troubleshooti (@ ng Troubleshooting - Windows cannot access \\test v Verify the shared drive S Check the the spelling spelling ofof the the name. name. Otherwse, Otherwsie, there there mught aught be be aa problem problem wath with your your network. network. To To v Ping Ping the the IP IP address address of of the the target target computer computer A try tryto wdentify identify and and resolve network peoblems, chick Diagnese v MOdify the network security settings Modify the network security settings SN (R)"5 Hide detais rom— Duagnose o Cancel v Reinstall the network adapter drive (':‘/\ Hide detoils SR v’ Enable NetBIOS over TCP/IP Error code: (x2D070035 Error code: (52O00035 v Rename Rename the the computer computer SSOS The network path was not found. v Disable the firewall Copyright © by EC-C cll, All Rights Reserved, Reproduction Is Strictly Prohibited Troubleshooting Network Issues: Network Path Cannot Be Found Error code 0x80070035, “The network path was not found,” appears when hosting a system on a network to access files from another system without Ethernet. [ R e | ' e i v Windows cannot access \\test Check the spelling of the aame. name. Otherwrie, there mught be a problem with your network. To try to wdentify and resolve network pecblems, peoblems, chck chick Diagnese I:::\:, I::;:' Hide details hagnose ragnose Cancel Error code: (520070035 Errer The network path was not found, Figure 16.28: Network error A few different and unrelated technical problems generate this error. This issue often occurs for the following reasons: = The network connection does not exist. = Network security settings do not allow sharing. =* The name of the computer with which the connection is to be established is too long. = The connection or system is blocked by firewall or antivirus software. Module 16 Page 1951 Certified Cybersecurity Technician Copyright © by EC-Council EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting Methods to Troubleshoot “The Network Path Cannot Be Found” Error = Verify the shared drive: o Right-click the drive that is to be shared and select Properties. — |-nsme v Devices and drives (3) \ Local Disk (C:) - Floppy Disk Drive (A:) ~ Open ) L) Open in new window i DVD Drive (D:) CCSA_XB4FRE_EN-US_DVS Pin to Quick access 0 bytes free of 4.03 GB & Turn on BitLocker Tumn m Scan with Windows Defender... Share with > Restore previous versions Pin to Start Format... Copy Create shortcut B Rename Figure 16.29: Select the Drive to be Shared o Navigate to the Sharing tab. Click Advanced Sharing... if it says Network Path: Not Shared under the section Network File and Folder Sharing. % Local Disk (C:) Properties X Securty Previous Versions General Tools Hardware Network File and Folder Sharing ¥ A\ s' Mot Shared Mot Shared Share Advanced Sharing Set custom permissions, create multiple shares, and set other advanced shanng options. " ’ QAdvanced Shanng... Password Protection People must have a user account and password for this computer to access shared folders To change this setting, use the Network and Shanng Center. Close anc fpply Apply Figure 16.30: Share the Selected Drive Module 16 Page 1952 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Tick the box for Share this folder, ensure the Share name is correct, and click Apply and OK. o To ensure the drive is shared, open the Run window in the system that needs to access the drive, type the name of the drive, and click OK..2 Run '< X =7 =3 Type the name of a program, folder, document, or Internet Typethe = resource, and Windows will open it for you. Open: [ v Cancel Browse... Figure 16.31: Ensure the Drive is Shared = Ping the IP address of the target system: o On the target system, type in the following command in the command prompt. BN C:\Windows\system32\cmd.exe Microsoft Windows [Version 10.0.15863] (c) 2017 Microsoft Corporation. All rights reserved. “:\Users\ ipconfig /all Windows IP Configuration Host Name Primary Dns Suffix Node Type IP Routing Enabled WINS Proxy Enabled Figure 16.32: Execute “ipconfig” Command o Locate the category IPv4 Address and note down the address (192.168.43.157) here. Figure 16.33: Locate IPv4 Module 16 Page 1953 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Again, type in the Run window \\IPv4 Address\(the drive that is to be accessed). /< Run < X Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: | \\192.168.43.157\c v] 0K Cancel ‘[ Browse... Figure 16.34: Ensure the Drive to be Accessed o Ensure that the specified drive is the one that is shared (the C drive in this case). = Modify the network security settings: In case the above two methods did not work, check whether the problem is with the network connection. o Double-click Local Policies/Security Options/Network security: LAN Manager authentication level. o From the drop-down menu, select Send LM & NTLM-use NTLMv2 session security if negotiated and click Apply and OK. o Try accessing the shared drive now. 1 1 Y ) urity P = g ‘ | File Action View Help | 2m XD Em HEm Network security: LAN Manager authentication level Prop... 7 Xx A iT Security Settings Policy > LA L@ Account Policies Local Local Securty Settng Securty Settng Explan Explan. Network access: Shares that can be accessed anenymously v L4 |4 Local Policies j Network securty: LAN Manager autherticaticn authenticaticn level.. Network access: Sharing and security medel for local accou.., > L4 AuditAudit Policy Poli ) : U::v':?i eh:yAni pels. Network security: Allew Local System to use computer ident... > L@ User Rights Assignment ’ (A Secur gOp v 3.. Network LocalSystem NULL session fallback security: Allow LecalSystem |4 Security Options. Network security: Allow PKU2U authentication requests to t... > ) Windows Defender Firewall with Adve [Send LM & NTLM - use NTLMv2 session securty f€ negatiated negotiated ~| | ) ] Network List Manager Policies.. Network security: Configure encryption types allowed for Ke..... Network security: Do net store LAN Manager hash value en... Modfying tha setting may affect affect compatibdty with clents, services, > ] Public Key Policies ‘ sppicaticns) and applcation: >» ) | Software Restriction Policies Seftware... Network security: Force logoff when logon hours expire For more infoematicn., infoematicn.see N, Network rk secunty:y: LAN Manager Manager authentication level autherticaton autherticoton level 1Q823659) > | ] Application Control Policies 5>> &, & IPIP Security Security Policies Policies on on Local Local Com, Com ". Network security: LDAP client signing requirements >» ] | Advanced Audit Policy Config.. Network security: Minimum security: Minimum session session security security for for NTLM NTLM SSP SSP........ Network security: Minimum session security for NTLM NTUM SSP...... Network security: Restrict NTUM: NTLM: Add remote server excepti..... Network security: Restrict NTUM: Add server exceptions in t.... Network security: Restrict NTUM: Audit Incoming.. Incoeming NTLM Traf..... Network security: Restrict NTLM: Audit NTLM authenticatio...... Network secunity: security: Restrict NTLM: Incoming NTLM traffic teaffic.... Network security: Restrict NTUM: Network NTLM: NTLM authentication in thi...... Network security: Restrict NTUM: Outgoing NTLM traffic tor.... Recovery le: Allow autematic automatic administrative ad ive logon logen. Recovery conscle: Allow floppy copy and access to all drives.... Shutdown: Allow system to be shut down without having to... Shitdnwn: Shatdaun: Claar virtial vietial maman: nanefils nansfils Figure 16.35: Modify Network Security Settings Module 16 Page 1954 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting = Reinstall network adapters o Connect the computer to the Internet with a physical wire and run the command devmgmt.msc. o Click the View tab in the Device Manager window and check Show hidden devices. &;.{ Device Manager -- [m] a XX File Action | View Help | @ m| -. Devices by type l v & RDDW-( Devices by connection =7 m >> i| Aud Devices by container > 3 Com Con Resources by type > & Digi Resources by connection > > > > [ Firm Customize... > > bets e Human Interface Devices > *@ IDE ATA/ATAPI controllers » =2 Keyboards > (§ Mice and other pointing devices » [ Monitors [> R Portse (COM ] ] &LPT) > 7= = Print queues > I [ Processors > YB Security devices > ¥ Scftwere components > [ Software devices > | Sound, video and game controllers > G Storage controllers > = mm Storage volume shadow copies ) 7w Storage Storage volumes > @ System devices « B llnivereal w8 lnivereal Saral Rue cantenllare Displays legacy devices and devices that are no longer installed., Figure 16.36: Check “Show hidden devices” The hidden adapters are shown with light-colored translucent icons when the list of network adapters is expanded. o Right-click all the drivers and uninstall them by selecting Uninstall device. v [ Network adapters [P BlackBerry Virtual Private Network ' Bluetooth Device (Personal Area Network) 57 Bluetooth Device (RFCOMM Protocol TDI) (57 I8 Intel(R) Centrino(R) Wireless-N 2230 1| Microsoft Hosted Network Virtual Adapter Update driver [ (5 Microsoft Kernel Debug Network Adapter T T ' Microsoft Wi-Fi Direct Virtual Adapter I Microsoft Wi-Fi Direct Virtual Adapter #2 Scan for hardware changes [ RAS Async Adapter (57 Realtek PCle FE Family Controller Properties Figure 16.37: Uninstall Network Adapter o Reboot the system and check if the issue is resolved. Module 16 Page 1955 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting = Enable NetBIOS over TCP/IP o Runthe Run the command ncpa.cpl. @ Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: l[ ncpa.cpl ] P OK Cancel Browse... Figure 16.38: Run “ncpa.cpl” o Right-click the active Wi-Fi or Ethernet connection and select Properties. o Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. UY Wi-Fi Properties X Networking Sharing Connect using: & ¥ Qualcomm Atheros AR9485 Wireless Network Adapter This connection uses the following tems: )V) B3 Clientfor Microsoft Networks AN ‘I VMware Brdge Protocol N" RODOKKERE " File and Printer Sharing for Microsoft Networks ROKK R T QoS Packet Scheduler 4 Microsoft Network Adapter Multiplexor 4. Muttiplexor Protocol 44. Microsoft LLDP Protocol Driver v Descrioti. Install... Uil Uninstall Transmission Control Protocol/Intemet Protocol. The default defauit wide area network protocol that provides communication across diverse interconnected networks. OK Cancel Figure 16.39: Select Properties of TCP/IPv4 o Click Advanced in the next window and switch to the WINS tab under Advanced TCP/IP Settings. Module 16 Page 1956 Certified Cybersecurity Technician Copyright © by EC-Council EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Under NetBIOS setting, check Enable NetBIOS over TCP/IP and click OK. Advanced TCP/I Settings TCP/IP Setting: IPIP Settings DNS ~ WINS i WINS addresses, in order of use: Add... Edit... Remove If LMHOSTS lookup is enabled, it applies to all connections for which TCP/IP is enabled. Enable LMHOSTS lookup | Import LMHOSTS... NetBIOS setting NetBIOS setting O Default: O Default: Use NetBIOS setting from the DHCP server. If static IP address is used or the DHCP server does not provide NetBIOS setting, enable NetBIOS over TCP/IP. |_® Enable NetBIOS over TCP/IP | (O Disable NetBIOS over TCP/IP Figure 16.40: Enable NetBIOS over TCP/IP o Reboot the PC to save the changes. *= Rename the computer o Go to Control Panel/Credential Manager. o Select Windows Credentials and click Add a Windows credential. Manage your credentials View and delete your saved logon information for websites, connected applications and networks. || mWeb % Web Credentials Credentials %Wfindows % Windows Credentials Credentials Back up Credentials Restore Credentials IWindows |Windows Credentials Add a Windows credential No Windows credentials. Certificate-Based Credentials Add a certificate-based credential No certificates, Figure 16.41: Add a Windows Credential Module 16 Page 1957 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Certified Cybersecurity Technician Technician Exam Exam 212-82 212-82 Network Troubleshooting o Sequentially enter the username and password of each machine connected to the network. Type the address of the website or network location and your credentials Make sure that the user name and password that you type can be used to access the location. Internet or network address (e.g. myserver, server.company.com): lI | I User name: [ ] Password: _ ] OK Cancel Figure 16.42: Enter Credentials for Machine o Follow the above procedure for the connected PCs. = Disable antivirus and firewall o Right-click the antivirus program icon from the system tray and select Disable. Open Norton Security Run QuickScan Search Run LiveUpdate View Recent History Get Support Turn on Silent Mode Disable Smart Firewall Check for New Version Figure 16.43: Disable Anti-virus o Select the time frame for which the antivirus program will remain disabled. n Security Request 7* = Protection Alert ter vl vulnerablet your computer Select the duration. hout. o @Nonon =3 Figure 16.44: Duration Selection Module 16 Page 1958 Certified Cybersecurity Technician Copyright © by EG-Bouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Once done, check whether the error is resolved. o Go to Control Panel/System and Security. o Click Windows Firewall. -= v N ‘ » Control Panel » System System and Security and Security > File Edit View Tools Help Control e Panel H Control Panel Home. and Maintenance Security. and a (& ¢ Review your computer's status and resolve issues. Change * System and Security Troubleshoot common computer problems Network and Internet Hardware and Sound Check firewall status Allow an app through Windows Firewall | Programs Windows Firewall User Accounts SyStem S)'Stem Set firewall security options to help View amount of RAM| protect your computer from hackers jtejte a Appearance and See the name of this d @and and malicious software. Personalization Clock, Language, and Region \0 \& Power Options Change battery settings =~= Change what the power buttons do Ease of Access Figure 16.45: Click “Windows Firewall” o Click Turn Windows Firewall on or off from the left pane. @ ‘ Windows Firewall Windows Firewall &« - v 4 @ > Control Panel File Edit View Tools Help Control Panel Home ® Allow an app or feature through Windows Firewall Change notification settings Turn Windows Firewall on or off Restore defaults Advanced settings Troubleshoot my network Figure 16.46: Select “Turn Windows Firewall on or off” Option o Select Turn off Windows Firewall and restart the PC. Module 16 Page 1959 Certified Cybersecurity Technician Copyright © by EG-Gouncil EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser