ログイン

Nmap Comma 1-42: ( ex.7 )
42問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    What is Nmap, and why is it used?

    - Nmap is a free network scanning tool used to discover hosts and services on a network by analyzing responses to various packets and requests.

  • 2

    What is the Nmap command used for?

    Penetration testers and network administrators will use Nmap to discover machines on a network and their open ports, running services, operating systems, and a wealth of other useful information.

  • 3

    Is Nmap scanning legal?

    - This depends on your jurisdiction. In many places, the answer is no, not without prior permission from the owner of the site or network.

  • 4

    What can we hack with Nmap?

    Nmap is a tool used for scanning and enumeration. Hackers and penetration testers use the information gathered to see what the available attack surface is. However, there are a great number of NSE scripts that can perform such actions as password brute forcing, checking for backup and configuration files, searching for remote file inclusion (RFI) vulnerabilities, and testing default credentials.

  • 5

    How do I scan an IP with Nmap?

    - A basic scan of a single IP address is as easy as: nmap <ip> This will return if the host is up and responding to ping, what ports are open, and what services are running on them. More complex commands can be found in the cheat sheet above.

  • 6

    Is it OK to Nmap Google?

    - The long answer is, it depends on your jurisdiction. The short answer is, probably not and you shouldn’t do it. Even if it isn’t illegal where you live, it will most certainly violate Google’s terms of service.

  • 7

    Do firewalls block Nmap?

    - Firewalls can block access to ports, which would indeed block Nmap. Nmap does have flags to attempt to evade firewalls and intrusion detection systems, which we have listed in the cheat sheet above.

  • 8

    Is Nmap a vulnerability?

    - After you have installed Nmap on your host system, an over-ambitious antivirus program may flag it as malicious. So long as you have downloaded it from the official Nmap website, it is safe to have installed.

  • 9

    Can Nmap bypass a firewall?

    - Nmap has several optional services which can attempt to bypass firewalls and spoof its scans.

  • 10

    Can Nmap hack WiFi?

    - Nmap has many NSE scripts designed to brute force different services and logins. Depending on the login portal, there may be a relevant script to do so. More realistically, Nmap would be used to enumerate the network, and one of many free programs better suited to WiFi hacking would be used afterward.

  • 11

    Can Nmap crack passwords?

    - Nmap has many brute force scripts which will automate password login attempts on various services, such as MySQL, Telenet, and POP3. This may provide a quick win, but password attacks are better handled by tools dedicated to that purpose, such as THC Hydra.

  • 12

    How do I read Nmap results?

    - Fortunately, even the more complex Nmap scans display their results in a clear and easy-to-follow manner. You also have the ability to output the data in various forms, including as an XML or grepable file (see the Output section for details).

  • 13

    Within Target Specification Select the Example and Switch to: Scan a single IP

    - nmap 192.168.1.1

  • 14

    Within Target Specification Select the Example and Switch to: Scan specific IPs

    - nmap 192.168.1.1 192.168.2.1

  • 15

    Within Target Specification Select the Example and Switch to: Scan a range

    - nmap 192.168.1.1-254

  • 16

    Within Target Specification Select the Example and Switch to: Scan a domain

    - nmap scanme.nmap.org

  • 17

    Within Target Specification Select the Example and Switch to: Scan using CID notation

    - nmap 192.168.1.0/24

  • 18

    Within Target Specification Select the Example and Switch to: Scan targets from a file

    - nmap-iL targets.txt, - iL

  • 19

    Within Target Specification Select the Example and Switch to: Scan 100 random hosts

    - nmap -iR 100, - iR

  • 20

    Within Target Specification Select the Example and Switch to: Exclude listed hosts

    - nmap --exclude 192.168.1.1, --exclude

  • 21

    Within Scan Techniques: Select the Example and Switch to: TCP SYN port scan (Default)

    - nmap 192.168.1.1 -sS, -sS

  • 22

    Within Scan Techniques: Select the Example and Switch to: TCP connect port scan (Default without root privilege)

    - nmap 192.168.1.1 -sT, -sT

  • 23

    Within Scan Techniques: Select the Example and Switch to: UDP port scan

    - nmap 192.168.1.1 -sU, -sU

  • 24

    Within Scan Techniques: Select the Example and Switch to: TCP ACK port scan

    - nmap 192.168.1.1 -sA, -sA

  • 25

    Within Scan Techniques: Select the Example and Switch to: TCP Window port scan

    - nmap 192.168.1.1 -sW, -sW

  • 26

    Within Scan Techniques: Select the Example and Switch to: TCP Maimon port scan

    - nmap 192.168.1.1 -sM, -sM

  • 27

    Within Host Discovery: Select the Example and Switch to: No Scan. List targets only

    - nmap 192.168.1.1-3 -sL, -sL

  • 28

    Within Host Discovery: Select the Example and Switch to: Disable port scanning

    - nmap 192.168.1.1/24 -sn, -sn

  • 29

    Within Host Discovery: Select the Example and Switch to: Disable host discovery. Port scan only

    - nmap 192.168.1.1-5 -Pn, -Pn

  • 30

    Within Host Discovery: Select the Example and Switch to: TCP SYN discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PS22-25,80, -PS

  • 31

    Within Host Discovery: Select the Example and Switch to: TCP ACK discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PA22-25,80, -PA

  • 32

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 33

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 34

    Within Host Discovery: Select the Example and Switch to: Never do DNS resolution

    - nmap 192.168.1.1 -n, -n

  • 35

    Within Port Specification: Select the Example and Switch to: Port scan for port x

    - nmap 192.168.1.1 -p 21, -p

  • 36

    Within Port Specification: Select the Example and Switch to: Port range

    - nmap 192.168.1.1 -p 21-100, -p

  • 37

    Within Port Specification: Select the Example and Switch to: Port scan multiple TCP and UDP ports

    - nmap 192.168.1.1 -p U:53,T:21-25,80, -p

  • 38

    Within Port Specification: Select the Example and Switch to: Port scan all ports

    - nmap 192.168.1.1 -p-, -p-

  • 39

    Within Port Specification: Select the Example and Switch to: Port scan from service name

    - nmap 192.168.1.1 -p http,https, -p

  • 40

    Within Port Specification: Select the Example and Switch to: Fast port scan (100 ports)

    - nmap 192.168.1.1 -F, -F

  • 41

    Within Port Specification: Select the Example and Switch to: Port scan the top x ports

    - nmap 192.168.1.1 --top-ports 2000, --top-ports

  • 42

    Within Port Specification: Select the Example and Switch to: Leaving off initial port in range makes the scan start at port 1

    - nmap 192.168.1.1 -p-65535, -p-65535

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    What is Nmap, and why is it used?

    - Nmap is a free network scanning tool used to discover hosts and services on a network by analyzing responses to various packets and requests.

  • 2

    What is the Nmap command used for?

    Penetration testers and network administrators will use Nmap to discover machines on a network and their open ports, running services, operating systems, and a wealth of other useful information.

  • 3

    Is Nmap scanning legal?

    - This depends on your jurisdiction. In many places, the answer is no, not without prior permission from the owner of the site or network.

  • 4

    What can we hack with Nmap?

    Nmap is a tool used for scanning and enumeration. Hackers and penetration testers use the information gathered to see what the available attack surface is. However, there are a great number of NSE scripts that can perform such actions as password brute forcing, checking for backup and configuration files, searching for remote file inclusion (RFI) vulnerabilities, and testing default credentials.

  • 5

    How do I scan an IP with Nmap?

    - A basic scan of a single IP address is as easy as: nmap <ip> This will return if the host is up and responding to ping, what ports are open, and what services are running on them. More complex commands can be found in the cheat sheet above.

  • 6

    Is it OK to Nmap Google?

    - The long answer is, it depends on your jurisdiction. The short answer is, probably not and you shouldn’t do it. Even if it isn’t illegal where you live, it will most certainly violate Google’s terms of service.

  • 7

    Do firewalls block Nmap?

    - Firewalls can block access to ports, which would indeed block Nmap. Nmap does have flags to attempt to evade firewalls and intrusion detection systems, which we have listed in the cheat sheet above.

  • 8

    Is Nmap a vulnerability?

    - After you have installed Nmap on your host system, an over-ambitious antivirus program may flag it as malicious. So long as you have downloaded it from the official Nmap website, it is safe to have installed.

  • 9

    Can Nmap bypass a firewall?

    - Nmap has several optional services which can attempt to bypass firewalls and spoof its scans.

  • 10

    Can Nmap hack WiFi?

    - Nmap has many NSE scripts designed to brute force different services and logins. Depending on the login portal, there may be a relevant script to do so. More realistically, Nmap would be used to enumerate the network, and one of many free programs better suited to WiFi hacking would be used afterward.

  • 11

    Can Nmap crack passwords?

    - Nmap has many brute force scripts which will automate password login attempts on various services, such as MySQL, Telenet, and POP3. This may provide a quick win, but password attacks are better handled by tools dedicated to that purpose, such as THC Hydra.

  • 12

    How do I read Nmap results?

    - Fortunately, even the more complex Nmap scans display their results in a clear and easy-to-follow manner. You also have the ability to output the data in various forms, including as an XML or grepable file (see the Output section for details).

  • 13

    Within Target Specification Select the Example and Switch to: Scan a single IP

    - nmap 192.168.1.1

  • 14

    Within Target Specification Select the Example and Switch to: Scan specific IPs

    - nmap 192.168.1.1 192.168.2.1

  • 15

    Within Target Specification Select the Example and Switch to: Scan a range

    - nmap 192.168.1.1-254

  • 16

    Within Target Specification Select the Example and Switch to: Scan a domain

    - nmap scanme.nmap.org

  • 17

    Within Target Specification Select the Example and Switch to: Scan using CID notation

    - nmap 192.168.1.0/24

  • 18

    Within Target Specification Select the Example and Switch to: Scan targets from a file

    - nmap-iL targets.txt, - iL

  • 19

    Within Target Specification Select the Example and Switch to: Scan 100 random hosts

    - nmap -iR 100, - iR

  • 20

    Within Target Specification Select the Example and Switch to: Exclude listed hosts

    - nmap --exclude 192.168.1.1, --exclude

  • 21

    Within Scan Techniques: Select the Example and Switch to: TCP SYN port scan (Default)

    - nmap 192.168.1.1 -sS, -sS

  • 22

    Within Scan Techniques: Select the Example and Switch to: TCP connect port scan (Default without root privilege)

    - nmap 192.168.1.1 -sT, -sT

  • 23

    Within Scan Techniques: Select the Example and Switch to: UDP port scan

    - nmap 192.168.1.1 -sU, -sU

  • 24

    Within Scan Techniques: Select the Example and Switch to: TCP ACK port scan

    - nmap 192.168.1.1 -sA, -sA

  • 25

    Within Scan Techniques: Select the Example and Switch to: TCP Window port scan

    - nmap 192.168.1.1 -sW, -sW

  • 26

    Within Scan Techniques: Select the Example and Switch to: TCP Maimon port scan

    - nmap 192.168.1.1 -sM, -sM

  • 27

    Within Host Discovery: Select the Example and Switch to: No Scan. List targets only

    - nmap 192.168.1.1-3 -sL, -sL

  • 28

    Within Host Discovery: Select the Example and Switch to: Disable port scanning

    - nmap 192.168.1.1/24 -sn, -sn

  • 29

    Within Host Discovery: Select the Example and Switch to: Disable host discovery. Port scan only

    - nmap 192.168.1.1-5 -Pn, -Pn

  • 30

    Within Host Discovery: Select the Example and Switch to: TCP SYN discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PS22-25,80, -PS

  • 31

    Within Host Discovery: Select the Example and Switch to: TCP ACK discovery on port x. Port 80 by default

    - nmap 192.168.1.1-5 -PA22-25,80, -PA

  • 32

    Within Host Discovery: Select the Example and Switch to: UDP discovery on port x. Port 40125 by default

    - nmap 192.168.1.1-5 -PU53, -PU

  • 33

    Within Host Discovery: Select the Example and Switch to: ARP discovery on local network

    - nmap 192.168.1.1-1/24 -PR, -PR

  • 34

    Within Host Discovery: Select the Example and Switch to: Never do DNS resolution

    - nmap 192.168.1.1 -n, -n

  • 35

    Within Port Specification: Select the Example and Switch to: Port scan for port x

    - nmap 192.168.1.1 -p 21, -p

  • 36

    Within Port Specification: Select the Example and Switch to: Port range

    - nmap 192.168.1.1 -p 21-100, -p

  • 37

    Within Port Specification: Select the Example and Switch to: Port scan multiple TCP and UDP ports

    - nmap 192.168.1.1 -p U:53,T:21-25,80, -p

  • 38

    Within Port Specification: Select the Example and Switch to: Port scan all ports

    - nmap 192.168.1.1 -p-, -p-

  • 39

    Within Port Specification: Select the Example and Switch to: Port scan from service name

    - nmap 192.168.1.1 -p http,https, -p

  • 40

    Within Port Specification: Select the Example and Switch to: Fast port scan (100 ports)

    - nmap 192.168.1.1 -F, -F

  • 41

    Within Port Specification: Select the Example and Switch to: Port scan the top x ports

    - nmap 192.168.1.1 --top-ports 2000, --top-ports

  • 42

    Within Port Specification: Select the Example and Switch to: Leaving off initial port in range makes the scan start at port 1

    - nmap 192.168.1.1 -p-65535, -p-65535