-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathNmap
29 lines (15 loc) · 1.16 KB
/
Nmap
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
nmap is one of the most important tools in a pentesters arsenal. It allows a pentester to see which ports are open, and information about which services are running on those ports. Ergo this Task will focs on showing you nmaps various flags. The beginning questions can be completed by using the nmap man page; The final questions will require you to deploy the machine.
Answer the questions below:
+ what does nmap stand for : Network Mapper
+ How do you specify which port(s) to scan? : -p
+ How do you do a "ping scan"(just tests if the host(s) is up)? : -sn
+ What is the flag for a UDP scan? : -sU
+ How do you run default Scripts? : -sC
+ How do you enable "aggressive mode" (Enable OS detection, version detecion, Script scanning, and traceroute) : -A
+ What flag enables OS detection: -O
+ How do you get the versions of services running on the target machine : -sV
+ Deploy the Machine : No answer needed
+ How many ports are open on the machine? : 1
+ What service is running on the machine? : Apache
+ what is the version of the service? : 2.4.18
+ What is the output of the http-title script(included in default scripts) : Apache2 Ubuntu Default Page: it works