ログイン

8 ) EX. 7 | COMPLETE
90問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    How many metric groups are in the C.V.S.S.?

    3

  • 2

    What are the three main Metric Groups of the C.V.S.S.?

    - Base Metric Group, - Temporal Metric Group, - Environmental Metric Group

  • 3

    If the three main metric groups of the C.V.S.S., which metric group contains two sub divided metric groups?

    - Base Metric Group

  • 4

    What are the two sub divided metric groups within the Base Metric Group?

    - Exploitability Metric Group, - Impact Metric Group

  • 5

    List the metrics Within the Base Metric X Exploitability Metrics:

    - Attack Vector ( A.V. ), - Attack Complexity ( A.C. ), - Privileges Required ( P.R. ), - User Interaction ( U.I. )

  • 6

    List the metrics Within the Base Metric X Impact Metrics:

    - Confidentiality Impact ( C ), - Integrity Impact ( I ), - Availability Impact ( A )

  • 7

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Attack Vector ( A.V. ) :

    Attack Vector ( A.V. ) :, - Network ( N ), - Adjacent ( A ), - Local ( L ), - Physical ( P )

  • 8

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Attack Complexity ( A.C. ) :

    Attack Complexity ( A.C. ) :, - Low ( L ) , - High ( H )

  • 9

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Privileges Required ( P.R. ) :

    Privileges Required ( P.R. ) :, - None ( N ), - Low ( L ) , - High ( H )

  • 10

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. User Interaction ( U.I. ) :

    User Interaction ( U.I. ) :, - None ( N ), - Required ( R )

  • 11

    - List the Value Metrics for Base Metrics X.B. Scope ( S ) :

    Scope ( S ) :, - Unchanged ( U ), - Changed ( C )

  • 12

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Confidentiality Impact ( C ) :

    Confidentiality Impact ( C ) :, - High ( H ), - Low ( L ), - None ( N )

  • 13

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Integrity Impact ( I ) :

    Integrity Impact ( I ) :, - High ( H ) , - Low ( L ), - None ( N )

  • 14

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Availability Impact ( A ) :

    Availability Impact ( A ) :, - High ( H ), - Low ( L ) , - None ( N )

  • 15

    - List the Value Metrics for Temporal Metrics X.B. Exploit Code Maturity ( E ) :

    Exploit Code Maturity ( E ) :, - Not Defined ( X ), - High ( H ), - Functional ( F ) , - Proof-of-Concept ( P ), - Unproven ( U )

  • 16

    - List the Value Metrics for Temporal Metrics X.B. Remediation Level ( R.L. ) :

    Remediation Level ( R.L. ) :, - Not Defined ( X ), - Unavailable ( U ), - Workaround ( W ) , - Temporary Fix ( T ), - Official Fix ( O )

  • 17

    - List the Value Metrics for Temporal Metrics X.B. Report Confidence ( R.C. ) :

    Report Confidence ( R.C. ) :, - Not Defined ( X ) , - Confirmed ( C ) , - Reasonable ( R ) , - Unknown ( U )

  • 18

    - List the Value Metrics for Environmental Metrics X X.B. Security Requirements ( C.R. , I.R. , A.R. ) :

    Security Requirements ( C.R. , I.R. , A.R. ) :, - Not Defined ( X ), - High ( H ), - Medium ( M ) , - Low ( L )

  • 19

    - In the C.V.S.S. X Environmental Metric X.B. Modified Base Metric, list the Values in it’s appropriate order?

    Modified Base Metric, - Modified Attack Vector ( M.A.V. ), - Modified Attack Complexity ( M.A.C. ), - Modified Privileges Required ( M.P.R. ), - Modified User Interaction ( M.U.I. ), - Modified Scope ( M.S. ), - Modified Confidentiality ( M.C. ), - Modified Integrity ( M.I. ), - Modified Availability ( M.A. )

  • 20

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a None Rating?

    0.0

  • 21

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Low Rating?

    0.1 - 3.9

  • 22

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Medium Rating?

    4.0 - 6.9

  • 23

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a High Rating?

    7.0 - 8.9

  • 24

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Critical Rating?

    9.0 - 10.0

  • 25

    Summarize the following Vector String: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

    - A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics

  • 26

    Space:

    - Encoded as %20 or +.

  • 27

    " (double quote):

    - Encoded as %22.

  • 28

    < (less than):

    - Encoded as %3C.

  • 29

    > (greater than):

    - Encoded as %3E.

  • 30

    ? (question mark):

    - Encoded as %3F.

  • 31

    / (forward slash):

    - Encoded as %2F.

  • 32

    & (ampersand):

    - Encoded as %26.

  • 33

    # (hash):

    - Encoded as %23.

  • 34

    [ (left square bracket):

    - Encoded as %5B.

  • 35

    ] (right square bracket):

    - Encoded as %5D.

  • 36

    { (left curly brace):

    - Encoded as %7B.

  • 37

    } (right curly brace):

    - Encoded as %7D.

  • 38

    - | (vertical bar):

    - Encoded as %7C.

  • 39

    ^ (caret):

    - Encoded as %5E.

  • 40

    ~ (tilde):

    - Encoded as %7E.

  • 41

    ` (backtick/grave accent):

    - Encoded as %60.

  • 42

    ! (exclamation point):

    - Encoded as %21.

  • 43

    $ (dollar sign):

    - Encoded as %24.

  • 44

    ' (single quote):

    - Encoded as %27.

  • 45

    ( (left parenthesis):

    - Encoded as %28.

  • 46

    ) (right parenthesis):

    - Encoded as %29.

  • 47

    * (asterisk):

    - Encoded as %2A.

  • 48

    , (comma):

    - Encoded as %2C.

  • 49

    ; (semicolon):

    - Encoded as %3B.

  • 50

    = (equal sign):

    - Encoded as %3D.

  • 51

    + (plus sign):

    - Encoded as %2B.

  • 52

    : (colon):

    - Encoded as %3A.

  • 53

    What is Nmap, and why is it used?

    - Nmap is a free network scanning tool used to discover hosts and services on a network by analyzing responses to various packets and requests.

  • 54

    What is the Nmap command used for?

    Penetration testers and network administrators will use Nmap to discover machines on a network and their open ports, running services, operating systems, and a wealth of other useful information.

  • 55

    Is Nmap scanning legal?

    - This depends on your jurisdiction. In many places, the answer is no, not without prior permission from the owner of the site or network.

  • 56

    What can we hack with Nmap?

    Nmap is a tool used for scanning and enumeration. Hackers and penetration testers use the information gathered to see what the available attack surface is. However, there are a great number of NSE scripts that can perform such actions as password brute forcing, checking for backup and configuration files, searching for remote file inclusion (RFI) vulnerabilities, and testing default credentials.

  • 57

    How do I scan an IP with Nmap?

    - A basic scan of a single IP address is as easy as: nmap <ip> This will return if the host is up and responding to ping, what ports are open, and what services are running on them. More complex commands can be found in the cheat sheet above.

  • 58

    Is it OK to Nmap Google?

    - The long answer is, it depends on your jurisdiction. The short answer is, probably not and you shouldn’t do it. Even if it isn’t illegal where you live, it will most certainly violate Google’s terms of service.

  • 59

    Do firewalls block Nmap?

    - Firewalls can block access to ports, which would indeed block Nmap. Nmap does have flags to attempt to evade firewalls and intrusion detection systems, which we have listed in the cheat sheet above.

  • 60

    Is Nmap a vulnerability?

    - After you have installed Nmap on your host system, an over-ambitious antivirus program may flag it as malicious. So long as you have downloaded it from the official Nmap website, it is safe to have installed.

  • 61

    Can Nmap bypass a firewall?

    - Nmap has several optional services which can attempt to bypass firewalls and spoof its scans.

  • 62

    Can Nmap hack WiFi?

    - Nmap has many NSE scripts designed to brute force different services and logins. Depending on the login portal, there may be a relevant script to do so. More realistically, Nmap would be used to enumerate the network, and one of many free programs better suited to WiFi hacking would be used afterward.

  • 63

    Can Nmap crack passwords?

    - Nmap has many brute force scripts which will automate password login attempts on various services, such as MySQL, Telenet, and POP3. This may provide a quick win, but password attacks are better handled by tools dedicated to that purpose, such as THC Hydra.

  • 64

    How do I read Nmap results?

    - Fortunately, even the more complex Nmap scans display their results in a clear and easy-to-follow manner. You also have the ability to output the data in various forms, including as an XML or grepable file (see the Output section for details).

  • 65

    Within Target Specification Select the Example and Switch to: Scan a single IP

    - nmap 192.168.1.1

  • 66

    Within Target Specification Select the Example and Switch to: Scan specific IPs

    - nmap 192.168.1.1 192.168.2.1

  • 67

    Within Target Specification Select the Example and Switch to: Scan a range

    - nmap 192.168.1.1-254

  • 68

    Within Target Specification Select the Example and Switch to: Scan a domain

    - nmap scanme.nmap.org

  • 69

    Within Target Specification Select the Example and Switch to: Scan using CID notation

    - nmap 192.168.1.0/24

  • 70

    Within Target Specification Select the Example and Switch to: Scan targets from a file

    - nmap-iL targets.txt, - iL

  • 71

    Within Target Specification Select the Example and Switch to: Scan 100 random hosts

    - nmap -iR 100, - iR

  • 72

    Within Target Specification Select the Example and Switch to: Exclude listed hosts

    - nmap --exclude 192.168.1.1, --exclude

  • 73

    Within Scan Techniques: Select the Example and Switch to: TCP SYN port scan (Default)

    - nmap 192.168.1.1 -sS, -sS

  • 74

    Within Scan Techniques: Select the Example and Switch to: TCP connect port scan (Default without root privilege)

    - nmap 192.168.1.1 -sT, -sT

  • 75

    Within Scan Techniques: Select the Example and Switch to: UDP port scan

    - nmap 192.168.1.1 -sU, -sU

  • 76

    Within Scan Techniques: Select the Example and Switch to: TCP ACK port scan

    - nmap 192.168.1.1 -sA, -sA

  • 77

    Within Scan Techniques: Select the Example and Switch to: TCP Window port scan

    - nmap 192.168.1.1 -sW, -sW

  • 78

    Within Scan Techniques: Select the Example and Switch to: TCP Maimon port scan

    - nmap 192.168.1.1 -sM, -sM

  • 79

    Within Host Discovery: Select the Example and Switch to: No Scan. List targets only

    - nmap 192.168.1.1-3 -sL, -sL

  • 80

    Within Host Discovery: Select the Example and Switch to: Disable port scanning

    - nmap 192.168.1.1/24 -sn, -sn

  • 81

    Within Host Discovery: Select the Example and Switch to: Disable host discovery. Port scan only

    - nmap 192.168.1.1-5 -Pn, -Pn

  • 82

    Within Host Discovery: Select the Example and Switch to: TCP SYN discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PS22-25,80, -PS

  • 83

    Within Host Discovery: Select the Example and Switch to: TCP ACK discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PA22-25,80, -PA

  • 84

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 85

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 86

    Within Host Discovery: Select the Example and Switch to: Never do DNS resolution

    - nmap 192.168.1.1 -n, -n

  • 87

    Within Port Specification: Select the Example and Switch to: Port scan for port x

    - nmap 192.168.1.1 -p 21, -p

  • 88

    Within Port Specification: Select the Example and Switch to: Port range

    - nmap 192.168.1.1 -p 21-100, -p

  • 89

    Within Port Specification: Select the Example and Switch to: Port scan multiple TCP and UDP ports

    - nmap 192.168.1.1 -p U:53,T:21-25,80, -p

  • 90

    Within Port Specification: Select the Example and Switch to: Port scan all ports

    - nmap 192.168.1.1 -p-, -p-

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    How many metric groups are in the C.V.S.S.?

    3

  • 2

    What are the three main Metric Groups of the C.V.S.S.?

    - Base Metric Group, - Temporal Metric Group, - Environmental Metric Group

  • 3

    If the three main metric groups of the C.V.S.S., which metric group contains two sub divided metric groups?

    - Base Metric Group

  • 4

    What are the two sub divided metric groups within the Base Metric Group?

    - Exploitability Metric Group, - Impact Metric Group

  • 5

    List the metrics Within the Base Metric X Exploitability Metrics:

    - Attack Vector ( A.V. ), - Attack Complexity ( A.C. ), - Privileges Required ( P.R. ), - User Interaction ( U.I. )

  • 6

    List the metrics Within the Base Metric X Impact Metrics:

    - Confidentiality Impact ( C ), - Integrity Impact ( I ), - Availability Impact ( A )

  • 7

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Attack Vector ( A.V. ) :

    Attack Vector ( A.V. ) :, - Network ( N ), - Adjacent ( A ), - Local ( L ), - Physical ( P )

  • 8

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Attack Complexity ( A.C. ) :

    Attack Complexity ( A.C. ) :, - Low ( L ) , - High ( H )

  • 9

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. Privileges Required ( P.R. ) :

    Privileges Required ( P.R. ) :, - None ( N ), - Low ( L ) , - High ( H )

  • 10

    - List the Value Metrics for Base Metrics X Exploitability Metrics X.B. User Interaction ( U.I. ) :

    User Interaction ( U.I. ) :, - None ( N ), - Required ( R )

  • 11

    - List the Value Metrics for Base Metrics X.B. Scope ( S ) :

    Scope ( S ) :, - Unchanged ( U ), - Changed ( C )

  • 12

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Confidentiality Impact ( C ) :

    Confidentiality Impact ( C ) :, - High ( H ), - Low ( L ), - None ( N )

  • 13

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Integrity Impact ( I ) :

    Integrity Impact ( I ) :, - High ( H ) , - Low ( L ), - None ( N )

  • 14

    - List the Value Metrics for Base Metrics X Impact Metrics X.B. Availability Impact ( A ) :

    Availability Impact ( A ) :, - High ( H ), - Low ( L ) , - None ( N )

  • 15

    - List the Value Metrics for Temporal Metrics X.B. Exploit Code Maturity ( E ) :

    Exploit Code Maturity ( E ) :, - Not Defined ( X ), - High ( H ), - Functional ( F ) , - Proof-of-Concept ( P ), - Unproven ( U )

  • 16

    - List the Value Metrics for Temporal Metrics X.B. Remediation Level ( R.L. ) :

    Remediation Level ( R.L. ) :, - Not Defined ( X ), - Unavailable ( U ), - Workaround ( W ) , - Temporary Fix ( T ), - Official Fix ( O )

  • 17

    - List the Value Metrics for Temporal Metrics X.B. Report Confidence ( R.C. ) :

    Report Confidence ( R.C. ) :, - Not Defined ( X ) , - Confirmed ( C ) , - Reasonable ( R ) , - Unknown ( U )

  • 18

    - List the Value Metrics for Environmental Metrics X X.B. Security Requirements ( C.R. , I.R. , A.R. ) :

    Security Requirements ( C.R. , I.R. , A.R. ) :, - Not Defined ( X ), - High ( H ), - Medium ( M ) , - Low ( L )

  • 19

    - In the C.V.S.S. X Environmental Metric X.B. Modified Base Metric, list the Values in it’s appropriate order?

    Modified Base Metric, - Modified Attack Vector ( M.A.V. ), - Modified Attack Complexity ( M.A.C. ), - Modified Privileges Required ( M.P.R. ), - Modified User Interaction ( M.U.I. ), - Modified Scope ( M.S. ), - Modified Confidentiality ( M.C. ), - Modified Integrity ( M.I. ), - Modified Availability ( M.A. )

  • 20

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a None Rating?

    0.0

  • 21

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Low Rating?

    0.1 - 3.9

  • 22

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Medium Rating?

    4.0 - 6.9

  • 23

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a High Rating?

    7.0 - 8.9

  • 24

    - In the Qualitative Severity Rating Scale, What is the C.V.S.S. Score for a Critical Rating?

    9.0 - 10.0

  • 25

    Summarize the following Vector String: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

    - A vulnerability with Base metric values of, , - “Attack Vector: Network, , - Attack Complexity: Low,, - Privileges Required: High,, - User Interaction: None, , - Scope: Unchanged, , - Confidentiality: Low, , - Integrity: Low, , - Availability: None” , - and no specified Temporal or Environmental metrics

  • 26

    Space:

    - Encoded as %20 or +.

  • 27

    " (double quote):

    - Encoded as %22.

  • 28

    < (less than):

    - Encoded as %3C.

  • 29

    > (greater than):

    - Encoded as %3E.

  • 30

    ? (question mark):

    - Encoded as %3F.

  • 31

    / (forward slash):

    - Encoded as %2F.

  • 32

    & (ampersand):

    - Encoded as %26.

  • 33

    # (hash):

    - Encoded as %23.

  • 34

    [ (left square bracket):

    - Encoded as %5B.

  • 35

    ] (right square bracket):

    - Encoded as %5D.

  • 36

    { (left curly brace):

    - Encoded as %7B.

  • 37

    } (right curly brace):

    - Encoded as %7D.

  • 38

    - | (vertical bar):

    - Encoded as %7C.

  • 39

    ^ (caret):

    - Encoded as %5E.

  • 40

    ~ (tilde):

    - Encoded as %7E.

  • 41

    ` (backtick/grave accent):

    - Encoded as %60.

  • 42

    ! (exclamation point):

    - Encoded as %21.

  • 43

    $ (dollar sign):

    - Encoded as %24.

  • 44

    ' (single quote):

    - Encoded as %27.

  • 45

    ( (left parenthesis):

    - Encoded as %28.

  • 46

    ) (right parenthesis):

    - Encoded as %29.

  • 47

    * (asterisk):

    - Encoded as %2A.

  • 48

    , (comma):

    - Encoded as %2C.

  • 49

    ; (semicolon):

    - Encoded as %3B.

  • 50

    = (equal sign):

    - Encoded as %3D.

  • 51

    + (plus sign):

    - Encoded as %2B.

  • 52

    : (colon):

    - Encoded as %3A.

  • 53

    What is Nmap, and why is it used?

    - Nmap is a free network scanning tool used to discover hosts and services on a network by analyzing responses to various packets and requests.

  • 54

    What is the Nmap command used for?

    Penetration testers and network administrators will use Nmap to discover machines on a network and their open ports, running services, operating systems, and a wealth of other useful information.

  • 55

    Is Nmap scanning legal?

    - This depends on your jurisdiction. In many places, the answer is no, not without prior permission from the owner of the site or network.

  • 56

    What can we hack with Nmap?

    Nmap is a tool used for scanning and enumeration. Hackers and penetration testers use the information gathered to see what the available attack surface is. However, there are a great number of NSE scripts that can perform such actions as password brute forcing, checking for backup and configuration files, searching for remote file inclusion (RFI) vulnerabilities, and testing default credentials.

  • 57

    How do I scan an IP with Nmap?

    - A basic scan of a single IP address is as easy as: nmap <ip> This will return if the host is up and responding to ping, what ports are open, and what services are running on them. More complex commands can be found in the cheat sheet above.

  • 58

    Is it OK to Nmap Google?

    - The long answer is, it depends on your jurisdiction. The short answer is, probably not and you shouldn’t do it. Even if it isn’t illegal where you live, it will most certainly violate Google’s terms of service.

  • 59

    Do firewalls block Nmap?

    - Firewalls can block access to ports, which would indeed block Nmap. Nmap does have flags to attempt to evade firewalls and intrusion detection systems, which we have listed in the cheat sheet above.

  • 60

    Is Nmap a vulnerability?

    - After you have installed Nmap on your host system, an over-ambitious antivirus program may flag it as malicious. So long as you have downloaded it from the official Nmap website, it is safe to have installed.

  • 61

    Can Nmap bypass a firewall?

    - Nmap has several optional services which can attempt to bypass firewalls and spoof its scans.

  • 62

    Can Nmap hack WiFi?

    - Nmap has many NSE scripts designed to brute force different services and logins. Depending on the login portal, there may be a relevant script to do so. More realistically, Nmap would be used to enumerate the network, and one of many free programs better suited to WiFi hacking would be used afterward.

  • 63

    Can Nmap crack passwords?

    - Nmap has many brute force scripts which will automate password login attempts on various services, such as MySQL, Telenet, and POP3. This may provide a quick win, but password attacks are better handled by tools dedicated to that purpose, such as THC Hydra.

  • 64

    How do I read Nmap results?

    - Fortunately, even the more complex Nmap scans display their results in a clear and easy-to-follow manner. You also have the ability to output the data in various forms, including as an XML or grepable file (see the Output section for details).

  • 65

    Within Target Specification Select the Example and Switch to: Scan a single IP

    - nmap 192.168.1.1

  • 66

    Within Target Specification Select the Example and Switch to: Scan specific IPs

    - nmap 192.168.1.1 192.168.2.1

  • 67

    Within Target Specification Select the Example and Switch to: Scan a range

    - nmap 192.168.1.1-254

  • 68

    Within Target Specification Select the Example and Switch to: Scan a domain

    - nmap scanme.nmap.org

  • 69

    Within Target Specification Select the Example and Switch to: Scan using CID notation

    - nmap 192.168.1.0/24

  • 70

    Within Target Specification Select the Example and Switch to: Scan targets from a file

    - nmap-iL targets.txt, - iL

  • 71

    Within Target Specification Select the Example and Switch to: Scan 100 random hosts

    - nmap -iR 100, - iR

  • 72

    Within Target Specification Select the Example and Switch to: Exclude listed hosts

    - nmap --exclude 192.168.1.1, --exclude

  • 73

    Within Scan Techniques: Select the Example and Switch to: TCP SYN port scan (Default)

    - nmap 192.168.1.1 -sS, -sS

  • 74

    Within Scan Techniques: Select the Example and Switch to: TCP connect port scan (Default without root privilege)

    - nmap 192.168.1.1 -sT, -sT

  • 75

    Within Scan Techniques: Select the Example and Switch to: UDP port scan

    - nmap 192.168.1.1 -sU, -sU

  • 76

    Within Scan Techniques: Select the Example and Switch to: TCP ACK port scan

    - nmap 192.168.1.1 -sA, -sA

  • 77

    Within Scan Techniques: Select the Example and Switch to: TCP Window port scan

    - nmap 192.168.1.1 -sW, -sW

  • 78

    Within Scan Techniques: Select the Example and Switch to: TCP Maimon port scan

    - nmap 192.168.1.1 -sM, -sM

  • 79

    Within Host Discovery: Select the Example and Switch to: No Scan. List targets only

    - nmap 192.168.1.1-3 -sL, -sL

  • 80

    Within Host Discovery: Select the Example and Switch to: Disable port scanning

    - nmap 192.168.1.1/24 -sn, -sn

  • 81

    Within Host Discovery: Select the Example and Switch to: Disable host discovery. Port scan only

    - nmap 192.168.1.1-5 -Pn, -Pn

  • 82

    Within Host Discovery: Select the Example and Switch to: TCP SYN discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PS22-25,80, -PS

  • 83

    Within Host Discovery: Select the Example and Switch to: TCP ACK discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PA22-25,80, -PA

  • 84

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 85

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 86

    Within Host Discovery: Select the Example and Switch to: Never do DNS resolution

    - nmap 192.168.1.1 -n, -n

  • 87

    Within Port Specification: Select the Example and Switch to: Port scan for port x

    - nmap 192.168.1.1 -p 21, -p

  • 88

    Within Port Specification: Select the Example and Switch to: Port range

    - nmap 192.168.1.1 -p 21-100, -p

  • 89

    Within Port Specification: Select the Example and Switch to: Port scan multiple TCP and UDP ports

    - nmap 192.168.1.1 -p U:53,T:21-25,80, -p

  • 90

    Within Port Specification: Select the Example and Switch to: Port scan all ports

    - nmap 192.168.1.1 -p-, -p-