ログイン

9 ) EX. 8 | COMPLETE
88問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 2

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 3

    Within Port Specification: Select the Example and Switch to: Leaving off end port in range makes the scan go through to port 65535

    - nmap 192.168.1.1 -p0-, -pO-

  • 4

    Within Service and Version Detection: Select the Example and Switch to: Attempts to determine the version of the service running on port

    - nmap 192.168.1.1 -sV, -sV

  • 5

    Within Service and Version Detection: Select the Example and Switch to: Intensity level 0 to 9. Higher number increases possibility of correctness

    - nmap 192.168.1.1 -sV --version-intensity 8, --sV --version-intensity

  • 6

    Within Service and Version Detection: Select the Example and Switch to: Enable light mode. Lower possibility of correctness. Faster

    - nmap 192.168.1.1 -sV --version-light, -sV --version-light

  • 7

    Within Service and Version Detection: Select the Example and Switch to: Enable intensity level 9. Higher possibility of correctness. Slower

    - nmap 192.168.1.1 -sV --version-all, - -sV --version-all

  • 8

    Within Service and Version Detection: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 9

    Within Service and Version Detection PT-2: Select the Example and Switch to: Remote OS detection using TCP/IP stack fingerprinting

    - nmap 192.168.1.1 -O, -O

  • 10

    Within Service and Version Detection PT-2: Select the Example and Switch to: If at least one open and one closed TCP port are not found it will not try OS detection against host

    - nmap 192.168.1.1 -O --osscan-limit, -O --osscan-limit

  • 11

    Within Service and Version Detection PT-2: Select the Example and Switch to: Makes Nmap guess more aggressively

    - nmap 192.168.1.1 -O --osscan-guess, -O --osscan-guess

  • 12

    Within Service and Version Detection PT-2: Select the Example and Switch to: Set the maximum number x of OS detection tries against a target

    - nmap 192.168.1.1 -O --max-os-tries 1, -O --max-os-tries

  • 13

    Within Service and Version Detection PT-2: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 14

    Within Timing and Performance: Select the Example and Switch to: Paranoid (0) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T0, -T0

  • 15

    Within Timing and Performance: Select the Example and Switch to: Sneaky (1) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T1, -T1

  • 16

    Within Timing and Performance: Select the Example and Switch to: Polite (2) slows down the scan to use less bandwidth and use less target machine resources

    - nmap 192.168.1.1 -T2, -T2

  • 17

    Within Timing and Performance: Select the Example and Switch to: Normal (3) which is default speed

    - nmap 192.168.1.1 -T3, -T3

  • 18

    Within Timing and Performance: Select the Example and Switch to: Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network

    - nmap 192.168.1.1 -T4, -T4

  • 19

    Within Timing and Performance: Select the Example and Switch to: Insane (5) speeds scan; assumes you are on an extraordinarily fast network

    - nmap 192.168.1.1 -T5, -T5

  • 20

    Within Timing and Performance EXT: Select the Example and Switch to: Give up on target after this long

    - 1s; 4m; 2h, --host-timeout <time>

  • 21

    Within Timing and Performance EXT: Select the Example and Switch to: Specifies probe round trip time

    - 1s; 4m; 2h, --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>

  • 22

    Within Timing and Performance EXT: Select the Example and Switch to: Parallel host scan group sizes

    - 50; 1024, --min-hostgroup/max-hostgroup <size>

  • 23

    Within Timing and Performance EXT: Select the Example and Switch to: Probe parallelization

    - 10; 1, --min-parallelism/max-parallelism <numprobes>

  • 24

    Within Timing and Performance EXT: Select the Example and Switch to: Adjust delay between probes

    - 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>

  • 25

    Within Timing and Performance EXT: Select the Example and Switch to: Specify the maximum number of port scan probe retransmissions

    - 3, --max-retries <tries>

  • 26

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no slower than <number> per second

    - 100, --min-rate <number>

  • 27

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no faster than <number> per second

    - 100, --max-rate <number>

  • 28

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe

    - nmap 192.168.1.1 -sC, -sC

  • 29

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe. [ ft ]

    - nmap 192.168.1.1 --script default, --script default

  • 30

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a single script. Example banner

    - nmap 192.168.1.1 --script=banner, --script

  • 31

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a wildcard. Example http

    - nmap 192.168.1.1 --script=http*, --script

  • 32

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with two scripts. Example http and banner

    - nmap 192.168.1.1 --script=http,banner, --script

  • 33

    Within N.S.E. Scripts: Select the Example and Switch to: Scan default, but remove intrusive scripts

    - nmap 192.168.1.1 --script "not intrusive", --script

  • 34

    Within N.S.E. Scripts: Select the Example and Switch to: NSE script with arguments

    - nmap --script snmp-sysdescr --script-args snmpcommunity=admin 192.168.1.1, --script-args

  • 35

    Within Useful NSE Script Examples: Select the Example and Switch to: http site map generator

    - nmap -Pn --script=http-sitemap-generator scanme.nmap.org

  • 36

    Within Useful NSE Script Examples: Select the Example and Switch to: Fast search for random web servers

    - nmap -n -Pn -p 80 --open -sV -vvv --script banner,http-title -iR 1000

  • 37

    Within Useful NSE Script Examples: Select the Example and Switch to: Brute forces DNS hostnames guessing subdomains

    - nmap -Pn --script=dns-brute domain.com

  • 38

    Within Useful NSE Script Examples: Select the Example and Switch to: Safe SMB scripts to run

    - nmap -n -Pn -vv -O -sV --script smb-enum*,smb-ls,smb-mbenum,smb-os-discovery,smb-s*,smb-vuln*,smbv2* -vv 192.168.1.1

  • 39

    Within Useful NSE Script Examples: Select the Example and Switch to: Whois query

    - nmap --script whois* domain.com

  • 40

    Within Useful NSE Script Examples: Select the Example and Switch to: Detect cross site scripting vulnerabilities.

    - nmap -p80 --script http-unsafe-output-escaping scanme.nmap.org

  • 41

    Within Useful NSE Script Examples: Select the Example and Switch to: Check for SQL injections

    - nmap -p80 --script http-sql-injection scanme.nmap.org

  • 42

    Within Useful Firewall / I.D.S. Evasion and Spoofing Examples: Select the Example and Switch to: Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

    - nmap 192.168.1.1 -f, -f

  • 43

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Above example explained

    - nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip, -D

  • 44

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Scan Facebook from Microso

    - nmap -S www.microsoft.com www.facebook.com, -S

  • 45

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Use given source port number

    - nmap -g 53 192.168.1.1, -g

  • 46

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Relay connections through HTTP/SOCKS4 proxies

    - nmap --proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1, --proxies

  • 47

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Appends random data to sent packets

    - nmap--data-length200192.168.1.1, --data-length

  • 48

    Within Useful Output Examples: Select the Example and Switch to: Normal output to the file normal.file

    - nmap 192.168.1.1 -oN normal.file, -oN

  • 49

    Within Useful Output Examples: Select the Example and Switch to: XML output to the file xml.file

    - nmap 192.168.1.1 -oX xml.file, -oX

  • 50

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to the file grep.file

    - nmap 192.168.1.1 -oG grep.file, -oG

  • 51

    Within Useful Output Examples: Select the Example and Switch to: Output in the three major formats at once

    - nmap 192.168.1.1 -oA results, -oA

  • 52

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to screen. -oN -, -oX - also usable

    - nmap 192.168.1.1 -oG -, -oG -

  • 53

    Within Useful Output Examples: Select the Example and Switch to: Append a scan to a previous scan file

    - nmap 192.168.1.1 -oN file.file --append-output, --append-output

  • 54

    Within Useful Output Examples: Select the Example and Switch to: Increase the verbosity level (use -vv or more for greater effect)

    - nmap 192.168.1.1 -v, -v

  • 55

    Within Useful Output Examples: Select the Example and Switch to: Increase debugging level (use -dd or more for greater effect)

    - nmap 192.168.1.1 -d, -d

  • 56

    Within Useful Output Examples: Select the Example and Switch to: Display the reason a port is in a particular state, same output as -vv

    - nmap 192.168.1.1 --reason, --reason

  • 57

    Within Useful Output Examples: Select the Example and Switch to: Only show open (or possibly open) ports

    - nmap 192.168.1.1 --open, --open

  • 58

    Within Useful Output Examples: Select the Example and Switch to: Show all packets sent and received

    - nmap 192.168.1.1 -T4 --packet-trace, --packet-trace

  • 59

    Within Useful Output Examples: Select the Example and Switch to: Shows the host interfaces and routes

    - nmap --iflist, --iflist

  • 60

    Within Useful Output Examples: Select the Example and Switch to: Resume a scan

    - nmap --resume results.file, --resume

  • 61

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Scan for web servers and grep to show which IPs are running web servers

    - nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open

  • 62

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Generate a list of the IPs of live hosts

    - nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " -f5 > live-hosts.txt

  • 63

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Append IP to the list of live hosts

    - nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " -f5 >> live-hosts.txt

  • 64

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Compare output from nmap using the ndiff

    - ndiff scanl.xml scan2.xml

  • 65

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Convert nmap xml files to html files

    - xsltproc nmap.xml -o nmap.html

  • 66

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Reverse sorted list of how often ports turn up

    - grep " open " results.nmap | sed -r 's/ +/ /g' | sort | uniq -c | sort -rn | less

  • 67

    Within Miscellaneous Options Examples : Select the Example and Switch to: Enable IPv6 scanning

    - nmap -6 2607:f0d0:1002:51::4, -6

  • 68

    Within Miscellaneous Options Examples : Select the Example and Switch to: nmap help screen

    - nmap -h, -h

  • 69

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Discovery only on ports x, no port scan

    - nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn

  • 70

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Arp discovery only on local network, no port scan

    - nmap 192.168.1.1-1/24 -PR -sn -vv

  • 71

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Traceroute to random targets, no port scan

    - nmap -iR 10 -sn -traceroute

  • 72

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Query the Internal DNS for hosts, list targets only

    - nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1

  • 73

    - TCP WINDOW SCAN ( -sW )

  • 74

    - IP PROTOCOL SCAN ( -sO )

  • 75

    - TCP PING SCAN ( -sP )

  • 76

    - TCP FIN SCAN ( -sF )

  • 77

    - TCP ACK SCAN ( -sA )

  • 78

    - UDP SCAN ( -sU )

  • 79

    - TCP NULL SCAN ( -sN )

  • 80

    - TCP connect() SCAN ( -sT )

  • 81

    - VERSION DETECTION SCAN ( -sV )

  • 82

    - TCP XMAS TREE SCAN ( -sX )

  • 83

    - TCP SYN SCAN ( -sS )

  • 84

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Set your own offset size

    - nmap 192.168.1.1 --mtu 32, --mtu

  • 85

    Within Port Specification: Select the Example and Switch to: Leaving off initial port in range makes the scan start at port 1

    - nmap 192.168.1.1 -p-65535, -p-65535

  • 86

    Within Port Specification: Select the Example and Switch to: Port scan the top x ports

    - nmap 192.168.1.1 --top-ports 2000, --top-ports

  • 87

    Within Port Specification: Select the Example and Switch to: Fast port scan (100 ports)

    - nmap 192.168.1.1 -F, -F

  • 88

    Within Port Specification: Select the Example and Switch to: Port scan from service name

    - nmap 192.168.1.1 -p http,https, -p

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 2

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 3

    Within Port Specification: Select the Example and Switch to: Leaving off end port in range makes the scan go through to port 65535

    - nmap 192.168.1.1 -p0-, -pO-

  • 4

    Within Service and Version Detection: Select the Example and Switch to: Attempts to determine the version of the service running on port

    - nmap 192.168.1.1 -sV, -sV

  • 5

    Within Service and Version Detection: Select the Example and Switch to: Intensity level 0 to 9. Higher number increases possibility of correctness

    - nmap 192.168.1.1 -sV --version-intensity 8, --sV --version-intensity

  • 6

    Within Service and Version Detection: Select the Example and Switch to: Enable light mode. Lower possibility of correctness. Faster

    - nmap 192.168.1.1 -sV --version-light, -sV --version-light

  • 7

    Within Service and Version Detection: Select the Example and Switch to: Enable intensity level 9. Higher possibility of correctness. Slower

    - nmap 192.168.1.1 -sV --version-all, - -sV --version-all

  • 8

    Within Service and Version Detection: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 9

    Within Service and Version Detection PT-2: Select the Example and Switch to: Remote OS detection using TCP/IP stack fingerprinting

    - nmap 192.168.1.1 -O, -O

  • 10

    Within Service and Version Detection PT-2: Select the Example and Switch to: If at least one open and one closed TCP port are not found it will not try OS detection against host

    - nmap 192.168.1.1 -O --osscan-limit, -O --osscan-limit

  • 11

    Within Service and Version Detection PT-2: Select the Example and Switch to: Makes Nmap guess more aggressively

    - nmap 192.168.1.1 -O --osscan-guess, -O --osscan-guess

  • 12

    Within Service and Version Detection PT-2: Select the Example and Switch to: Set the maximum number x of OS detection tries against a target

    - nmap 192.168.1.1 -O --max-os-tries 1, -O --max-os-tries

  • 13

    Within Service and Version Detection PT-2: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 14

    Within Timing and Performance: Select the Example and Switch to: Paranoid (0) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T0, -T0

  • 15

    Within Timing and Performance: Select the Example and Switch to: Sneaky (1) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T1, -T1

  • 16

    Within Timing and Performance: Select the Example and Switch to: Polite (2) slows down the scan to use less bandwidth and use less target machine resources

    - nmap 192.168.1.1 -T2, -T2

  • 17

    Within Timing and Performance: Select the Example and Switch to: Normal (3) which is default speed

    - nmap 192.168.1.1 -T3, -T3

  • 18

    Within Timing and Performance: Select the Example and Switch to: Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network

    - nmap 192.168.1.1 -T4, -T4

  • 19

    Within Timing and Performance: Select the Example and Switch to: Insane (5) speeds scan; assumes you are on an extraordinarily fast network

    - nmap 192.168.1.1 -T5, -T5

  • 20

    Within Timing and Performance EXT: Select the Example and Switch to: Give up on target after this long

    - 1s; 4m; 2h, --host-timeout <time>

  • 21

    Within Timing and Performance EXT: Select the Example and Switch to: Specifies probe round trip time

    - 1s; 4m; 2h, --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>

  • 22

    Within Timing and Performance EXT: Select the Example and Switch to: Parallel host scan group sizes

    - 50; 1024, --min-hostgroup/max-hostgroup <size>

  • 23

    Within Timing and Performance EXT: Select the Example and Switch to: Probe parallelization

    - 10; 1, --min-parallelism/max-parallelism <numprobes>

  • 24

    Within Timing and Performance EXT: Select the Example and Switch to: Adjust delay between probes

    - 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>

  • 25

    Within Timing and Performance EXT: Select the Example and Switch to: Specify the maximum number of port scan probe retransmissions

    - 3, --max-retries <tries>

  • 26

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no slower than <number> per second

    - 100, --min-rate <number>

  • 27

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no faster than <number> per second

    - 100, --max-rate <number>

  • 28

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe

    - nmap 192.168.1.1 -sC, -sC

  • 29

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe. [ ft ]

    - nmap 192.168.1.1 --script default, --script default

  • 30

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a single script. Example banner

    - nmap 192.168.1.1 --script=banner, --script

  • 31

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a wildcard. Example http

    - nmap 192.168.1.1 --script=http*, --script

  • 32

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with two scripts. Example http and banner

    - nmap 192.168.1.1 --script=http,banner, --script

  • 33

    Within N.S.E. Scripts: Select the Example and Switch to: Scan default, but remove intrusive scripts

    - nmap 192.168.1.1 --script "not intrusive", --script

  • 34

    Within N.S.E. Scripts: Select the Example and Switch to: NSE script with arguments

    - nmap --script snmp-sysdescr --script-args snmpcommunity=admin 192.168.1.1, --script-args

  • 35

    Within Useful NSE Script Examples: Select the Example and Switch to: http site map generator

    - nmap -Pn --script=http-sitemap-generator scanme.nmap.org

  • 36

    Within Useful NSE Script Examples: Select the Example and Switch to: Fast search for random web servers

    - nmap -n -Pn -p 80 --open -sV -vvv --script banner,http-title -iR 1000

  • 37

    Within Useful NSE Script Examples: Select the Example and Switch to: Brute forces DNS hostnames guessing subdomains

    - nmap -Pn --script=dns-brute domain.com

  • 38

    Within Useful NSE Script Examples: Select the Example and Switch to: Safe SMB scripts to run

    - nmap -n -Pn -vv -O -sV --script smb-enum*,smb-ls,smb-mbenum,smb-os-discovery,smb-s*,smb-vuln*,smbv2* -vv 192.168.1.1

  • 39

    Within Useful NSE Script Examples: Select the Example and Switch to: Whois query

    - nmap --script whois* domain.com

  • 40

    Within Useful NSE Script Examples: Select the Example and Switch to: Detect cross site scripting vulnerabilities.

    - nmap -p80 --script http-unsafe-output-escaping scanme.nmap.org

  • 41

    Within Useful NSE Script Examples: Select the Example and Switch to: Check for SQL injections

    - nmap -p80 --script http-sql-injection scanme.nmap.org

  • 42

    Within Useful Firewall / I.D.S. Evasion and Spoofing Examples: Select the Example and Switch to: Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

    - nmap 192.168.1.1 -f, -f

  • 43

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Above example explained

    - nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip, -D

  • 44

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Scan Facebook from Microso

    - nmap -S www.microsoft.com www.facebook.com, -S

  • 45

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Use given source port number

    - nmap -g 53 192.168.1.1, -g

  • 46

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Relay connections through HTTP/SOCKS4 proxies

    - nmap --proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1, --proxies

  • 47

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Appends random data to sent packets

    - nmap--data-length200192.168.1.1, --data-length

  • 48

    Within Useful Output Examples: Select the Example and Switch to: Normal output to the file normal.file

    - nmap 192.168.1.1 -oN normal.file, -oN

  • 49

    Within Useful Output Examples: Select the Example and Switch to: XML output to the file xml.file

    - nmap 192.168.1.1 -oX xml.file, -oX

  • 50

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to the file grep.file

    - nmap 192.168.1.1 -oG grep.file, -oG

  • 51

    Within Useful Output Examples: Select the Example and Switch to: Output in the three major formats at once

    - nmap 192.168.1.1 -oA results, -oA

  • 52

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to screen. -oN -, -oX - also usable

    - nmap 192.168.1.1 -oG -, -oG -

  • 53

    Within Useful Output Examples: Select the Example and Switch to: Append a scan to a previous scan file

    - nmap 192.168.1.1 -oN file.file --append-output, --append-output

  • 54

    Within Useful Output Examples: Select the Example and Switch to: Increase the verbosity level (use -vv or more for greater effect)

    - nmap 192.168.1.1 -v, -v

  • 55

    Within Useful Output Examples: Select the Example and Switch to: Increase debugging level (use -dd or more for greater effect)

    - nmap 192.168.1.1 -d, -d

  • 56

    Within Useful Output Examples: Select the Example and Switch to: Display the reason a port is in a particular state, same output as -vv

    - nmap 192.168.1.1 --reason, --reason

  • 57

    Within Useful Output Examples: Select the Example and Switch to: Only show open (or possibly open) ports

    - nmap 192.168.1.1 --open, --open

  • 58

    Within Useful Output Examples: Select the Example and Switch to: Show all packets sent and received

    - nmap 192.168.1.1 -T4 --packet-trace, --packet-trace

  • 59

    Within Useful Output Examples: Select the Example and Switch to: Shows the host interfaces and routes

    - nmap --iflist, --iflist

  • 60

    Within Useful Output Examples: Select the Example and Switch to: Resume a scan

    - nmap --resume results.file, --resume

  • 61

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Scan for web servers and grep to show which IPs are running web servers

    - nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open

  • 62

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Generate a list of the IPs of live hosts

    - nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " -f5 > live-hosts.txt

  • 63

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Append IP to the list of live hosts

    - nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " -f5 >> live-hosts.txt

  • 64

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Compare output from nmap using the ndiff

    - ndiff scanl.xml scan2.xml

  • 65

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Convert nmap xml files to html files

    - xsltproc nmap.xml -o nmap.html

  • 66

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Reverse sorted list of how often ports turn up

    - grep " open " results.nmap | sed -r 's/ +/ /g' | sort | uniq -c | sort -rn | less

  • 67

    Within Miscellaneous Options Examples : Select the Example and Switch to: Enable IPv6 scanning

    - nmap -6 2607:f0d0:1002:51::4, -6

  • 68

    Within Miscellaneous Options Examples : Select the Example and Switch to: nmap help screen

    - nmap -h, -h

  • 69

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Discovery only on ports x, no port scan

    - nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn

  • 70

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Arp discovery only on local network, no port scan

    - nmap 192.168.1.1-1/24 -PR -sn -vv

  • 71

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Traceroute to random targets, no port scan

    - nmap -iR 10 -sn -traceroute

  • 72

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Query the Internal DNS for hosts, list targets only

    - nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1

  • 73

    - TCP WINDOW SCAN ( -sW )

  • 74

    - IP PROTOCOL SCAN ( -sO )

  • 75

    - TCP PING SCAN ( -sP )

  • 76

    - TCP FIN SCAN ( -sF )

  • 77

    - TCP ACK SCAN ( -sA )

  • 78

    - UDP SCAN ( -sU )

  • 79

    - TCP NULL SCAN ( -sN )

  • 80

    - TCP connect() SCAN ( -sT )

  • 81

    - VERSION DETECTION SCAN ( -sV )

  • 82

    - TCP XMAS TREE SCAN ( -sX )

  • 83

    - TCP SYN SCAN ( -sS )

  • 84

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Set your own offset size

    - nmap 192.168.1.1 --mtu 32, --mtu

  • 85

    Within Port Specification: Select the Example and Switch to: Leaving off initial port in range makes the scan start at port 1

    - nmap 192.168.1.1 -p-65535, -p-65535

  • 86

    Within Port Specification: Select the Example and Switch to: Port scan the top x ports

    - nmap 192.168.1.1 --top-ports 2000, --top-ports

  • 87

    Within Port Specification: Select the Example and Switch to: Fast port scan (100 ports)

    - nmap 192.168.1.1 -F, -F

  • 88

    Within Port Specification: Select the Example and Switch to: Port scan from service name

    - nmap 192.168.1.1 -p http,https, -p