exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 54 discussion

Actual exam question from CompTIA's PT0-002
Question #: 54
Topic #: 1
[All PT0-002 Questions]

A penetration tester wants to scan a target network without being detected by the client's IDS.
Which of the following scans is MOST likely to avoid detection?

  • A. nmap -P0 -T0 -sS 192.168.1.10
  • B. nmap -sA -sV --host-timeout 60 192.168.1.10
  • C. nmap -f --badsum 192.168.1.10
  • D. nmap -A -n 192.168.1.10
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
masso435
Highly Voted 2 years ago
Selected Answer: C
This same page says -P0 will appear in logs. It's C. https://nmap.org/book/man-bypass-firewalls-ids.html If Nmap is run without the -P0 flag when performing third-party scanning, the source IP address of the attacker’s host performs ICMP and TCP pinging of the target hosts before starting to scan; this can appear in firewall and IDS audit logs of security-conscious organizations.
upvoted 7 times
WANDOOCHOCO
10 months, 3 weeks ago
thank you for the link
upvoted 2 times
...
zimuz
1 year, 11 months ago
this is A not C then!
upvoted 4 times
...
...
RRabbit
Highly Voted 1 year, 10 months ago
C. nmap -f --badsum 192.168.1.10 The option "nmap -f --badsum 192.168.1.10" is most likely to avoid detection by the client's IDS. The -f option allows nmap to send fragments of packets with bad checksums, which can cause some IDS to ignore the traffic. This will make the scan less detectable to the IDS, as it will not be able to identify the scan as malicious traffic. However, this option can cause the scan to be less accurate and efficient, and it should be used with caution.
upvoted 7 times
...
Sodatex
Most Recent 1 day, 7 hours ago
Selected Answer: C
C: because fragmented packets with the incorrect checksum (--badsum) are hard to detect. A Syn Scan (-sS) is able to be detected by IDS/IPS
upvoted 1 times
...
overarch384
1 month, 2 weeks ago
Selected Answer: A
The answer is A
upvoted 4 times
...
fuzzyguzzy
4 months, 1 week ago
A. nmap -P0 -T0 -sS 192.168.1.10 -P0: This option tells Nmap not to ping the host before scanning, which can help avoid detection as it doesn’t generate ICMP echo requests that might alert the IDS. -T0: This sets the timing template to the slowest option, which reduces the scan speed and can help to evade detection by not overwhelming the target's network or IDS. -sS: The SYN scan is stealthier than other scan types because it doesn't complete the TCP handshake, which makes it harder for IDS systems to detect. Other Options: C. nmap -f --badsum 192.168.1.10: This command uses fragmented packets and sends packets with bad checksums. It can bypass some basic filtering, but may still be flagged by more sophisticated IDS systems.
upvoted 4 times
...
Jay39
4 months, 2 weeks ago
Selected Answer: A
A. nmap -P0 -T0 -sS 192.168.1.10 -P0: This option disables host discovery, meaning Nmap won't send ICMP echo requests (ping) to determine if hosts are up. -T0: Sets the timing template to paranoid, which slows down the scan to reduce the likelihood of detection. -sS: Performs a SYN scan, which is stealthier than other scan types like a TCP connect scan (-sT).
upvoted 3 times
...
Etc_Shadow28000
5 months, 1 week ago
Selected Answer: A
A. B. -sA performs an ACK scan, which is used for mapping firewall rules but does not identify open ports. -sV attempts version detection, which sends additional probes that can be detected by IDS. --host-timeout 60 sets a host timeout of 60 seconds, which might not be slow enough to avoid detection. C. -f enables packet fragmentation, which can help avoid detection but might not be effective against all IDS. --badsum sends packets with incorrect checksums, which might be detected by IDS as abnormal traffic. D. -A enables aggressive scan options, including OS detection, version detection, script scanning, and traceroute. These aggressive options generate significant traffic and are likely to be detected by IDS. -n disables DNS resolution, which does not contribute significantly to stealth.
upvoted 4 times
...
Hedwig74
8 months, 1 week ago
Cert master says that despite using T0, some IDS's can detect the handshake sequence and still catch the scan. Also, this would take a long time. Fragmenting and badsum are recommended in cert master for avoiding IDS detection.
upvoted 1 times
...
eisn
11 months ago
The answer is A. I understand that C is a better choice in the real world, but -badsum is not covered in the official manual. The answers are reflecting questions and -badsum doesn't really. Setting -P0 -T0 and -sS is trying to explicetly avoid detection. A smart IDS will detect -badsum, maybe. But it's not a dice.
upvoted 4 times
...
bracokey
1 year ago
Between options A and B: A. nmap -P0 -T0 -sS 192.168.1.10 B. nmap -f --badsum 192.168.1.10 Option A is likely the more cautious approach for avoiding detection. Setting the timing template to the slowest timing (-T0) and skipping the ping scan (-P0) can reduce the aggressiveness of the scan. This slower approach might make the scan less conspicuous and decrease the likelihood of triggering alerts on the Intrusion Detection System (IDS). Option B, while utilizing fragmenting packets and sending packets with a bad checksum, may introduce a level of obscurity but might also trigger IDS alerts, as such techniques can be detected by sophisticated security systems.
upvoted 2 times
...
Kirby87
1 year ago
When attempting to avoid detection by an IDS (Intrusion Detection System), a penetration tester may use techniques to make the scan less conspicuous. Among the given options, the scan that is MOST likely to avoid detection is: C. nmap -f --badsum 192.168.1.10 This command uses the --badsum option to generate packets with a bad checksum and the -f option to enable fragmenting packets. These techniques can sometimes be used to evade simple IDS signatures, as they might be interpreted as fragmented or corrupted traffic. However, it's important to note that the effectiveness of evasion techniques can vary, and sophisticated IDS may still be able to detect such scans.
upvoted 2 times
...
Skater_Grace
1 year, 2 months ago
Selected Answer: A
A is the correct answer. If Nmap is run without the -P0 flag when performing third-party scanning, the source IP address of the attacker’s host performs ICMP and TCP pinging of the target hosts before starting to scan; this can appear in firewall and IDS audit logs of security-conscious organizations.
upvoted 2 times
...
solutionz
1 year, 4 months ago
Selected Answer: C
C. nmap -f --badsum 192.168.1.10, which uses fragmented packets and packets with bad checksums, would be the MOST likely to avoid detection by the client's IDS. Fragmenting packets can make it more challenging for IDS to reassemble and analyze the packets, and using bad checksums might allow the packets to evade certain detection rules.
upvoted 1 times
...
biggydanny
1 year, 7 months ago
This is another of those confusing ones, A might be correct yet C is also worth looking at, I will go with C here as the official nmap website has both -f and badsums under Firewall/IDS Evasion and Spoofing...https://nmap.org/book/man-bypass-firewalls-ids.html
upvoted 1 times
...
lifehacker0777
1 year, 8 months ago
Selected Answer: C
Option A, "nmap -P0 -T0 -sS 192.168.1.10," may evade detection by some IDS systems, but it is less likely to be successful than option C. The "-P0" option disables host discovery using ICMP echo requests, which can prevent the target system from generating any logs related to the scan. However, some IDS systems may detect the SYN scan ("-sS") option used to perform the port scan. The "-T0" option sets a low timing template for the scan, but this alone may not be enough to avoid detection by some IDS systems. In addition, this option can also result in slower scans and longer wait times. Overall, while option A may provide some level of evasion from detection, option C, "nmap -f --badsum 192.168.1.10," is more likely to evade detection by using fragmentation and incorrect checksums to bypass some IDS systems.
upvoted 1 times
...
KingIT_ENG
1 year, 9 months ago
C (nmap -f --badsum 192.168.1.10)
upvoted 1 times
...
cy_analyst
1 year, 9 months ago
Selected Answer: C
(nmap -f --badsum 192.168.1.10) is most likely to avoid detection by the client's IDS. This scan uses fragmented packets with a bad checksum, which may evade certain types of IDS and firewalls that are configured to block or flag such packets.
upvoted 3 times
[Removed]
1 year, 9 months ago
Yes C is correct
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago