ログイン

Nmap Commands | 86 - 125: ( ex.8 )
42問 • 6ヶ月前
  • The R.S.S.H Delivery Company
  • 通報

    問題一覧

  • 1

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Above example explained

    - nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip, -D

  • 2

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Scan Facebook from Microso

    - nmap -S www.microsoft.com www.facebook.com, -S

  • 3

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Use given source port number

    - nmap -g 53 192.168.1.1, -g

  • 4

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Relay connections through HTTP/SOCKS4 proxies

    - nmap --proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1, --proxies

  • 5

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Appends random data to sent packets

    - nmap--data-length200192.168.1.1, --data-length

  • 6

    Within Useful Output Examples: Select the Example and Switch to: Normal output to the file normal.file

    - nmap 192.168.1.1 -oN normal.file, -oN

  • 7

    Within Useful Output Examples: Select the Example and Switch to: XML output to the file xml.file

    - nmap 192.168.1.1 -oX xml.file, -oX

  • 8

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to the file grep.file

    - nmap 192.168.1.1 -oG grep.file, -oG

  • 9

    Within Useful Output Examples: Select the Example and Switch to: Output in the three major formats at once

    - nmap 192.168.1.1 -oA results, -oA

  • 10

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to screen. -oN -, -oX - also usable

    - nmap 192.168.1.1 -oG -, -oG -

  • 11

    Within Useful Output Examples: Select the Example and Switch to: Append a scan to a previous scan file

    - nmap 192.168.1.1 -oN file.file --append-output, --append-output

  • 12

    Within Useful Output Examples: Select the Example and Switch to: Increase the verbosity level (use -vv or more for greater effect)

    - nmap 192.168.1.1 -v, -v

  • 13

    Within Useful Output Examples: Select the Example and Switch to: Increase debugging level (use -dd or more for greater effect)

    - nmap 192.168.1.1 -d, -d

  • 14

    Within Useful Output Examples: Select the Example and Switch to: Display the reason a port is in a particular state, same output as -vv

    - nmap 192.168.1.1 --reason, --reason

  • 15

    Within Useful Output Examples: Select the Example and Switch to: Only show open (or possibly open) ports

    - nmap 192.168.1.1 --open, --open

  • 16

    Within Useful Output Examples: Select the Example and Switch to: Show all packets sent and received

    - nmap 192.168.1.1 -T4 --packet-trace, --packet-trace

  • 17

    Within Useful Output Examples: Select the Example and Switch to: Shows the host interfaces and routes

    - nmap --iflist, --iflist

  • 18

    Within Useful Output Examples: Select the Example and Switch to: Resume a scan

    - nmap --resume results.file, --resume

  • 19

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Scan for web servers and grep to show which IPs are running web servers

    - nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open

  • 20

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Generate a list of the IPs of live hosts

    - nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " -f5 > live-hosts.txt

  • 21

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Append IP to the list of live hosts

    - nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " -f5 >> live-hosts.txt

  • 22

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Compare output from nmap using the ndiff

    - ndiff scanl.xml scan2.xml

  • 23

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Convert nmap xml files to html files

    - xsltproc nmap.xml -o nmap.html

  • 24

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Reverse sorted list of how often ports turn up

    - grep " open " results.nmap | sed -r 's/ +/ /g' | sort | uniq -c | sort -rn | less

  • 25

    Within Miscellaneous Options Examples : Select the Example and Switch to: Enable IPv6 scanning

    - nmap -6 2607:f0d0:1002:51::4, -6

  • 26

    Within Miscellaneous Options Examples : Select the Example and Switch to: nmap help screen

    - nmap -h, -h

  • 27

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Discovery only on ports x, no port scan

    - nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn

  • 28

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Arp discovery only on local network, no port scan

    - nmap 192.168.1.1-1/24 -PR -sn -vv

  • 29

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Traceroute to random targets, no port scan

    - nmap -iR 10 -sn -traceroute

  • 30

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Query the Internal DNS for hosts, list targets only

    - nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1

  • 31

    - TCP WINDOW SCAN ( -sW )

  • 32

    - IP PROTOCOL SCAN ( -sO )

  • 33

    - TCP PING SCAN ( -sP )

  • 34

    - TCP FIN SCAN ( -sF )

  • 35

    - TCP ACK SCAN ( -sA )

  • 36

    - UDP SCAN ( -sU )

  • 37

    - TCP NULL SCAN ( -sN )

  • 38

    - TCP connect() SCAN ( -sT )

  • 39

    - VERSION DETECTION SCAN ( -sV )

  • 40

    - TCP XMAS TREE SCAN ( -sX )

  • 41

    - TCP SYN SCAN ( -sS )

  • 42

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Set your own offset size

    - nmap 192.168.1.1 --mtu 32, --mtu

  • THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T: 1 CHRONICLE: ( ex.9 )

    THE P.T: 1 CHRONICLE: ( ex.9 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    The R.S.S.H Delivery Company · 88問 · 6ヶ月前

    THE P.T: 2 CHRONICLE: ( ex.10 )

    THE P.T: 2 CHRONICLE: ( ex.10 )

    88問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    The R.S.S.H Delivery Company · 89問 · 6ヶ月前

    THE P.T. 3: CHRONICLE: ( ex.12 )

    THE P.T. 3: CHRONICLE: ( ex.12 )

    89問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    The R.S.S.H Delivery Company · 52問 · 6ヶ月前

    THE P.T. 4: CHRONICLE: ( ex.11 )

    THE P.T. 4: CHRONICLE: ( ex.11 )

    52問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    The R.S.S.H Delivery Company · 92問 · 6ヶ月前

    THE P.T. 5: CHRONICLE: ( ex.13 )

    THE P.T. 5: CHRONICLE: ( ex.13 )

    92問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    The R.S.S.H Delivery Company · 90問 · 6ヶ月前

    THE P.T. 6: CHRONICLE: ( ex.14 )

    THE P.T. 6: CHRONICLE: ( ex.14 )

    90問 • 6ヶ月前
    The R.S.S.H Delivery Company

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    The R.S.S.H Delivery Company · 48問 · 6ヶ月前

    THE P.T. 7: ( ex.15 )

    THE P.T. 7: ( ex.15 )

    48問 • 6ヶ月前
    The R.S.S.H Delivery Company

    EXAM #1 |

    EXAM #1 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #1 |

    EXAM #1 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    The R.S.S.H Delivery Company · 5問 · 9ヶ月前

    1 ) Identify Security Control Types

    1 ) Identify Security Control Types

    5問 • 9ヶ月前
    The R.S.S.H Delivery Company

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    The R.S.S.H Delivery Company · 8問 · 9ヶ月前

    2 ) Threat Intelligence

    2 ) Threat Intelligence

    8問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM #2 |

    EXAM #2 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM #2 |

    EXAM #2 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    3 ) Classifying Threats

    3 ) Classifying Threats

    The R.S.S.H Delivery Company · 17問 · 9ヶ月前

    3 ) Classifying Threats

    3 ) Classifying Threats

    17問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 3 |

    EXAM # 3 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 3 |

    EXAM # 3 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    4 ) Threat Hunting

    4 ) Threat Hunting

    The R.S.S.H Delivery Company · 16問 · 9ヶ月前

    4 ) Threat Hunting

    4 ) Threat Hunting

    16問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 4 |

    EXAM # 4 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 4 |

    EXAM # 4 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    5 ) Network Forensics

    5 ) Network Forensics

    The R.S.S.H Delivery Company · 9問 · 9ヶ月前

    5 ) Network Forensics

    5 ) Network Forensics

    9問 • 9ヶ月前
    The R.S.S.H Delivery Company

    EXAM # 5 |

    EXAM # 5 |

    The R.S.S.H Delivery Company · 90問 · 7ヶ月前

    EXAM # 5 |

    EXAM # 5 |

    90問 • 7ヶ月前
    The R.S.S.H Delivery Company

    問題一覧

  • 1

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Above example explained

    - nmap -D decoy-ip1,decoy-ip2,your-own-ip,decoy-ip3,decoy-ip4 remote-host-ip, -D

  • 2

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Scan Facebook from Microso

    - nmap -S www.microsoft.com www.facebook.com, -S

  • 3

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Use given source port number

    - nmap -g 53 192.168.1.1, -g

  • 4

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Relay connections through HTTP/SOCKS4 proxies

    - nmap --proxies http://192.168.1.1:8080, http://192.168.1.2:8080 192.168.1.1, --proxies

  • 5

    Within Useful Firewall / I.D.S Evasion and Spoofing Examples: Select the Example and Switch to: Appends random data to sent packets

    - nmap--data-length200192.168.1.1, --data-length

  • 6

    Within Useful Output Examples: Select the Example and Switch to: Normal output to the file normal.file

    - nmap 192.168.1.1 -oN normal.file, -oN

  • 7

    Within Useful Output Examples: Select the Example and Switch to: XML output to the file xml.file

    - nmap 192.168.1.1 -oX xml.file, -oX

  • 8

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to the file grep.file

    - nmap 192.168.1.1 -oG grep.file, -oG

  • 9

    Within Useful Output Examples: Select the Example and Switch to: Output in the three major formats at once

    - nmap 192.168.1.1 -oA results, -oA

  • 10

    Within Useful Output Examples: Select the Example and Switch to: Grepable output to screen. -oN -, -oX - also usable

    - nmap 192.168.1.1 -oG -, -oG -

  • 11

    Within Useful Output Examples: Select the Example and Switch to: Append a scan to a previous scan file

    - nmap 192.168.1.1 -oN file.file --append-output, --append-output

  • 12

    Within Useful Output Examples: Select the Example and Switch to: Increase the verbosity level (use -vv or more for greater effect)

    - nmap 192.168.1.1 -v, -v

  • 13

    Within Useful Output Examples: Select the Example and Switch to: Increase debugging level (use -dd or more for greater effect)

    - nmap 192.168.1.1 -d, -d

  • 14

    Within Useful Output Examples: Select the Example and Switch to: Display the reason a port is in a particular state, same output as -vv

    - nmap 192.168.1.1 --reason, --reason

  • 15

    Within Useful Output Examples: Select the Example and Switch to: Only show open (or possibly open) ports

    - nmap 192.168.1.1 --open, --open

  • 16

    Within Useful Output Examples: Select the Example and Switch to: Show all packets sent and received

    - nmap 192.168.1.1 -T4 --packet-trace, --packet-trace

  • 17

    Within Useful Output Examples: Select the Example and Switch to: Shows the host interfaces and routes

    - nmap --iflist, --iflist

  • 18

    Within Useful Output Examples: Select the Example and Switch to: Resume a scan

    - nmap --resume results.file, --resume

  • 19

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Scan for web servers and grep to show which IPs are running web servers

    - nmap -p80 -sV -oG - --open 192.168.1.1/24 | grep open

  • 20

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Generate a list of the IPs of live hosts

    - nmap -iR 10 -n -oX out.xml | grep "Nmap" | cut -d " " -f5 > live-hosts.txt

  • 21

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Append IP to the list of live hosts

    - nmap -iR 10 -n -oX out2.xml | grep "Nmap" | cut -d " " -f5 >> live-hosts.txt

  • 22

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Compare output from nmap using the ndiff

    - ndiff scanl.xml scan2.xml

  • 23

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Convert nmap xml files to html files

    - xsltproc nmap.xml -o nmap.html

  • 24

    Within Other Helpful Nmap Output Examples: Select the Example and Command to: Reverse sorted list of how often ports turn up

    - grep " open " results.nmap | sed -r 's/ +/ /g' | sort | uniq -c | sort -rn | less

  • 25

    Within Miscellaneous Options Examples : Select the Example and Switch to: Enable IPv6 scanning

    - nmap -6 2607:f0d0:1002:51::4, -6

  • 26

    Within Miscellaneous Options Examples : Select the Example and Switch to: nmap help screen

    - nmap -h, -h

  • 27

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Discovery only on ports x, no port scan

    - nmap -iR 10 -PS22-25,80,113,1050,35000 -v -sn

  • 28

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Arp discovery only on local network, no port scan

    - nmap 192.168.1.1-1/24 -PR -sn -vv

  • 29

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Traceroute to random targets, no port scan

    - nmap -iR 10 -sn -traceroute

  • 30

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Query the Internal DNS for hosts, list targets only

    - nmap 192.168.1.1-50 -sL --dns-server 192.168.1.1

  • 31

    - TCP WINDOW SCAN ( -sW )

  • 32

    - IP PROTOCOL SCAN ( -sO )

  • 33

    - TCP PING SCAN ( -sP )

  • 34

    - TCP FIN SCAN ( -sF )

  • 35

    - TCP ACK SCAN ( -sA )

  • 36

    - UDP SCAN ( -sU )

  • 37

    - TCP NULL SCAN ( -sN )

  • 38

    - TCP connect() SCAN ( -sT )

  • 39

    - VERSION DETECTION SCAN ( -sV )

  • 40

    - TCP XMAS TREE SCAN ( -sX )

  • 41

    - TCP SYN SCAN ( -sS )

  • 42

    Within Other Useful Nmap Commands Examples: Select the Example and Command to: Set your own offset size

    - nmap 192.168.1.1 --mtu 32, --mtu