SIMULATION -
You are a penetration tester running port scans on a server.
INSTRUCTIONS -
Part 1: Given the output, construct the command that was used to generate this output from the available options.
Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part 1 -
Part 2 -
ryanzou
Highly Voted 2 years, 6 months agoAnarckii
Highly Voted 1 year, 10 months agoeuca2023
Most Recent 2 weeks, 4 days agoJblak
1 month, 2 weeks agoDtones2423
2 months agoFart2023
6 months, 3 weeks agopinderanttal
3 months, 3 weeks agoFart2023
6 months, 3 weeks agoHunterxSeb
8 months, 3 weeks agoElDirec
1 year, 2 months agoLiveLaughToasterBath
1 year, 3 months ago[Removed]
1 year, 4 months agoDRVision
1 year, 5 months agoMysterClyde
1 year, 10 months agosurfuganda
1 year agotaylorhung
1 year, 5 months agoTheSkyMan
2 years agocy_analyst
2 years, 1 month ago[Removed]
2 years, 1 month agoKingIT_ENG
2 years, 1 month agoFrog_Man
2 years, 1 month ago[Removed]
2 years, 1 month ago2Fish
2 years, 2 months ago2Fish
2 years, 2 months ago[Removed]
2 years, 2 months agouser82
1 year, 1 month ago