![]() To continue learning about Nmap, please join the room Nmap Basic Port Scans, which introduces the basic types of port scans. The following are the most popular scan types. What option should we add?Ģ2.Ensure you have taken note of all the Nmap options explained in this room. Nmap is able to use various different techniques to identify live hosts, open ports etc. Task 7 Nmap Host Discovery Using TCP and UDPġ8.Which TCP ping scan does not require a privileged account?ġ9.Which TCP ping scan requires a privileged account?Ģ0.What option do you need to add to Nmap to run a TCP SYN ping scan on the telnet port?Ģ1.We want Nmap to issue a reverse DNS lookup for all the possibles hosts on a subnet, hoping to get some insights from the names. * Data: try all the possible eight devices (other than computer1) in the network: computer2, computer3, computer4, computer5, computer6, switch1, switch2, and router.ġ4.How many devices are you able to discover using ARP requests? *ġ5.What is the option required to tell Nmap to use ICMP Timestamp to discover live hosts?ġ6.What is the option required to tell Nmap to use ICMP Address Mask to discover live hosts?ġ7.What is the option required to tell Nmap to use ICMP Echo to discover life hosts? We will be sending broadcast ARP Requests packets with the following options: * To computer4 (to indicate it is broadcast)Ĥ.How many devices can see the ARP Request?ĥ.Did computer6 reply to the ARP Request? (Y/N)Ħ.What is the first IP address Nmap would scan if you provided 10.10.12.13/29 as your target?ħ.How many IP addresses will Nmap scan if you provide the following range 10.10.0-255.101-125?Ĩ.What is the type of packet that computer1 sent before the ping?ĩ.What is the type of packet that computer1 received before being able to send the ping?ġ0.How many computers responded to the ping request?ġ1.What is the name of the first device that responded to the first ARP Request?ġ2.What is the name of the first device that responded to the second ARP Request?ġ3.Send another Ping Request. Fast nmap scanning for a network range: nmap -F 192.168.1.10/24 To see packets sent and received received using nmap: nmap -packet-trace 192.168.1.10 Scan for a port: nmap -p 22 192.168.1.10 Scan for multiple ports: nmap -p 80,22,21,111 Scan all ports using nmap: nmap -p '' 192.168.1.10 I hope that will help you. * Data: computer6 (because we are asking for computer6 MAC address using ARP Request)Ģ.How many devices can see the ARP Request?ģ.Did computer6 receive the ARP Request? (Y/N) ![]() ![]() * To computer1 (to indicate it is broadcast) 1.Some of these questions will require the use of a static site to answer the task questions, while others require the use of the AttackBox and the target VM.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |