ログイン

Nmap Comma | 43 - 85: ( ex.8 )
42問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 2

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 3

    Within Port Specification: Select the Example and Switch to: Leaving off end port in range makes the scan go through to port 65535

    - nmap 192.168.1.1 -p0-, -pO-

  • 4

    Within Service and Version Detection: Select the Example and Switch to: Attempts to determine the version of the service running on port

    - nmap 192.168.1.1 -sV, -sV

  • 5

    Within Service and Version Detection: Select the Example and Switch to: Intensity level 0 to 9. Higher number increases possibility of correctness

    - nmap 192.168.1.1 -sV --version-intensity 8, --sV --version-intensity

  • 6

    Within Service and Version Detection: Select the Example and Switch to: Enable light mode. Lower possibility of correctness. Faster

    - nmap 192.168.1.1 -sV --version-light, -sV --version-light

  • 7

    Within Service and Version Detection: Select the Example and Switch to: Enable intensity level 9. Higher possibility of correctness. Slower

    - nmap 192.168.1.1 -sV --version-all, - -sV --version-all

  • 8

    Within Service and Version Detection: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 9

    Within Service and Version Detection PT-2: Select the Example and Switch to: Remote OS detection using TCP/IP stack fingerprinting

    - nmap 192.168.1.1 -O, -O

  • 10

    Within Service and Version Detection PT-2: Select the Example and Switch to: If at least one open and one closed TCP port are not found it will not try OS detection against host

    - nmap 192.168.1.1 -O --osscan-limit, -O --osscan-limit

  • 11

    Within Service and Version Detection PT-2: Select the Example and Switch to: Makes Nmap guess more aggressively

    - nmap 192.168.1.1 -O --osscan-guess, -O --osscan-guess

  • 12

    Within Service and Version Detection PT-2: Select the Example and Switch to: Set the maximum number x of OS detection tries against a target

    - nmap 192.168.1.1 -O --max-os-tries 1, -O --max-os-tries

  • 13

    Within Service and Version Detection PT-2: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 14

    Within Timing and Performance: Select the Example and Switch to: Paranoid (0) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T0, -T0

  • 15

    Within Timing and Performance: Select the Example and Switch to: Sneaky (1) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T1, -T1

  • 16

    Within Timing and Performance: Select the Example and Switch to: Polite (2) slows down the scan to use less bandwidth and use less target machine resources

    - nmap 192.168.1.1 -T2, -T2

  • 17

    Within Timing and Performance: Select the Example and Switch to: Normal (3) which is default speed

    - nmap 192.168.1.1 -T3, -T3

  • 18

    Within Timing and Performance: Select the Example and Switch to: Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network

    - nmap 192.168.1.1 -T4, -T4

  • 19

    Within Timing and Performance: Select the Example and Switch to: Insane (5) speeds scan; assumes you are on an extraordinarily fast network

    - nmap 192.168.1.1 -T5, -T5

  • 20

    Within Timing and Performance EXT: Select the Example and Switch to: Give up on target after this long

    - 1s; 4m; 2h, --host-timeout <time>

  • 21

    Within Timing and Performance EXT: Select the Example and Switch to: Specifies probe round trip time

    - 1s; 4m; 2h, --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>

  • 22

    Within Timing and Performance EXT: Select the Example and Switch to: Parallel host scan group sizes

    - 50; 1024, --min-hostgroup/max-hostgroup <size>

  • 23

    Within Timing and Performance EXT: Select the Example and Switch to: Probe parallelization

    - 10; 1, --min-parallelism/max-parallelism <numprobes>

  • 24

    Within Timing and Performance EXT: Select the Example and Switch to: Adjust delay between probes

    - 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>

  • 25

    Within Timing and Performance EXT: Select the Example and Switch to: Specify the maximum number of port scan probe retransmissions

    - 3, --max-retries <tries>

  • 26

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no slower than <number> per second

    - 100, --min-rate <number>

  • 27

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no faster than <number> per second

    - 100, --max-rate <number>

  • 28

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe

    - nmap 192.168.1.1 -sC, -sC

  • 29

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe. [ ft ]

    - nmap 192.168.1.1 --script default, --script default

  • 30

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a single script. Example banner

    - nmap 192.168.1.1 --script=banner, --script

  • 31

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a wildcard. Example http

    - nmap 192.168.1.1 --script=http*, --script

  • 32

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with two scripts. Example http and banner

    - nmap 192.168.1.1 --script=http,banner, --script

  • 33

    Within N.S.E. Scripts: Select the Example and Switch to: Scan default, but remove intrusive scripts

    - nmap 192.168.1.1 --script "not intrusive", --script

  • 34

    Within N.S.E. Scripts: Select the Example and Switch to: NSE script with arguments

    - nmap --script snmp-sysdescr --script-args snmpcommunity=admin 192.168.1.1, --script-args

  • 35

    Within Useful NSE Script Examples: Select the Example and Switch to: http site map generator

    - nmap -Pn --script=http-sitemap-generator scanme.nmap.org

  • 36

    Within Useful NSE Script Examples: Select the Example and Switch to: Fast search for random web servers

    - nmap -n -Pn -p 80 --open -sV -vvv --script banner,http-title -iR 1000

  • 37

    Within Useful NSE Script Examples: Select the Example and Switch to: Brute forces DNS hostnames guessing subdomains

    - nmap -Pn --script=dns-brute domain.com

  • 38

    Within Useful NSE Script Examples: Select the Example and Switch to: Safe SMB scripts to run

    - nmap -n -Pn -vv -O -sV --script smb-enum*,smb-ls,smb-mbenum,smb-os-discovery,smb-s*,smb-vuln*,smbv2* -vv 192.168.1.1

  • 39

    Within Useful NSE Script Examples: Select the Example and Switch to: Whois query

    - nmap --script whois* domain.com

  • 40

    Within Useful NSE Script Examples: Select the Example and Switch to: Detect cross site scripting vulnerabilities.

    - nmap -p80 --script http-unsafe-output-escaping scanme.nmap.org

  • 41

    Within Useful NSE Script Examples: Select the Example and Switch to: Check for SQL injections

    - nmap -p80 --script http-sql-injection scanme.nmap.org

  • 42

    Within Useful Firewall / I.D.S. Evasion and Spoofing Examples: Select the Example and Switch to: Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

    - nmap 192.168.1.1 -f, -f

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 2

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 3

    Within Port Specification: Select the Example and Switch to: Leaving off end port in range makes the scan go through to port 65535

    - nmap 192.168.1.1 -p0-, -pO-

  • 4

    Within Service and Version Detection: Select the Example and Switch to: Attempts to determine the version of the service running on port

    - nmap 192.168.1.1 -sV, -sV

  • 5

    Within Service and Version Detection: Select the Example and Switch to: Intensity level 0 to 9. Higher number increases possibility of correctness

    - nmap 192.168.1.1 -sV --version-intensity 8, --sV --version-intensity

  • 6

    Within Service and Version Detection: Select the Example and Switch to: Enable light mode. Lower possibility of correctness. Faster

    - nmap 192.168.1.1 -sV --version-light, -sV --version-light

  • 7

    Within Service and Version Detection: Select the Example and Switch to: Enable intensity level 9. Higher possibility of correctness. Slower

    - nmap 192.168.1.1 -sV --version-all, - -sV --version-all

  • 8

    Within Service and Version Detection: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 9

    Within Service and Version Detection PT-2: Select the Example and Switch to: Remote OS detection using TCP/IP stack fingerprinting

    - nmap 192.168.1.1 -O, -O

  • 10

    Within Service and Version Detection PT-2: Select the Example and Switch to: If at least one open and one closed TCP port are not found it will not try OS detection against host

    - nmap 192.168.1.1 -O --osscan-limit, -O --osscan-limit

  • 11

    Within Service and Version Detection PT-2: Select the Example and Switch to: Makes Nmap guess more aggressively

    - nmap 192.168.1.1 -O --osscan-guess, -O --osscan-guess

  • 12

    Within Service and Version Detection PT-2: Select the Example and Switch to: Set the maximum number x of OS detection tries against a target

    - nmap 192.168.1.1 -O --max-os-tries 1, -O --max-os-tries

  • 13

    Within Service and Version Detection PT-2: Select the Example and Switch to: Enables OS detection, version detection, script scanning, and traceroute

    - nmap 192.168.1.1 -A, -A

  • 14

    Within Timing and Performance: Select the Example and Switch to: Paranoid (0) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T0, -T0

  • 15

    Within Timing and Performance: Select the Example and Switch to: Sneaky (1) Intrusion Detection System evasion

    - nmap 192.168.1.1 -T1, -T1

  • 16

    Within Timing and Performance: Select the Example and Switch to: Polite (2) slows down the scan to use less bandwidth and use less target machine resources

    - nmap 192.168.1.1 -T2, -T2

  • 17

    Within Timing and Performance: Select the Example and Switch to: Normal (3) which is default speed

    - nmap 192.168.1.1 -T3, -T3

  • 18

    Within Timing and Performance: Select the Example and Switch to: Aggressive (4) speeds scans; assumes you are on a reasonably fast and reliable network

    - nmap 192.168.1.1 -T4, -T4

  • 19

    Within Timing and Performance: Select the Example and Switch to: Insane (5) speeds scan; assumes you are on an extraordinarily fast network

    - nmap 192.168.1.1 -T5, -T5

  • 20

    Within Timing and Performance EXT: Select the Example and Switch to: Give up on target after this long

    - 1s; 4m; 2h, --host-timeout <time>

  • 21

    Within Timing and Performance EXT: Select the Example and Switch to: Specifies probe round trip time

    - 1s; 4m; 2h, --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>

  • 22

    Within Timing and Performance EXT: Select the Example and Switch to: Parallel host scan group sizes

    - 50; 1024, --min-hostgroup/max-hostgroup <size>

  • 23

    Within Timing and Performance EXT: Select the Example and Switch to: Probe parallelization

    - 10; 1, --min-parallelism/max-parallelism <numprobes>

  • 24

    Within Timing and Performance EXT: Select the Example and Switch to: Adjust delay between probes

    - 20ms; 2s; 4m; 5h, --scan-delay/--max-scan-delay <time>

  • 25

    Within Timing and Performance EXT: Select the Example and Switch to: Specify the maximum number of port scan probe retransmissions

    - 3, --max-retries <tries>

  • 26

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no slower than <number> per second

    - 100, --min-rate <number>

  • 27

    Within Timing and Performance EXT: Select the Example and Switch to: Send packets no faster than <number> per second

    - 100, --max-rate <number>

  • 28

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe

    - nmap 192.168.1.1 -sC, -sC

  • 29

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with default NSE scripts. Considered useful for discovery and safe. [ ft ]

    - nmap 192.168.1.1 --script default, --script default

  • 30

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a single script. Example banner

    - nmap 192.168.1.1 --script=banner, --script

  • 31

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with a wildcard. Example http

    - nmap 192.168.1.1 --script=http*, --script

  • 32

    Within N.S.E. Scripts: Select the Example and Switch to: Scan with two scripts. Example http and banner

    - nmap 192.168.1.1 --script=http,banner, --script

  • 33

    Within N.S.E. Scripts: Select the Example and Switch to: Scan default, but remove intrusive scripts

    - nmap 192.168.1.1 --script "not intrusive", --script

  • 34

    Within N.S.E. Scripts: Select the Example and Switch to: NSE script with arguments

    - nmap --script snmp-sysdescr --script-args snmpcommunity=admin 192.168.1.1, --script-args

  • 35

    Within Useful NSE Script Examples: Select the Example and Switch to: http site map generator

    - nmap -Pn --script=http-sitemap-generator scanme.nmap.org

  • 36

    Within Useful NSE Script Examples: Select the Example and Switch to: Fast search for random web servers

    - nmap -n -Pn -p 80 --open -sV -vvv --script banner,http-title -iR 1000

  • 37

    Within Useful NSE Script Examples: Select the Example and Switch to: Brute forces DNS hostnames guessing subdomains

    - nmap -Pn --script=dns-brute domain.com

  • 38

    Within Useful NSE Script Examples: Select the Example and Switch to: Safe SMB scripts to run

    - nmap -n -Pn -vv -O -sV --script smb-enum*,smb-ls,smb-mbenum,smb-os-discovery,smb-s*,smb-vuln*,smbv2* -vv 192.168.1.1

  • 39

    Within Useful NSE Script Examples: Select the Example and Switch to: Whois query

    - nmap --script whois* domain.com

  • 40

    Within Useful NSE Script Examples: Select the Example and Switch to: Detect cross site scripting vulnerabilities.

    - nmap -p80 --script http-unsafe-output-escaping scanme.nmap.org

  • 41

    Within Useful NSE Script Examples: Select the Example and Switch to: Check for SQL injections

    - nmap -p80 --script http-sql-injection scanme.nmap.org

  • 42

    Within Useful Firewall / I.D.S. Evasion and Spoofing Examples: Select the Example and Switch to: Requested scan (including ping scans) use tiny fragmented IP packets. Harder for packet filters

    - nmap 192.168.1.1 -f, -f