SIMULATION -
You are a penetration tester running port scans on a server.
INSTRUCTIONS -
Part 1: Given the output, construct the command that was used to generate this output from the available options.
Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Part 1 -
Part 2 -
ryanzou
Highly Voted 2 years, 3 months agoAnarckii
Highly Voted 1 year, 7 months agoFart2023
Most Recent 3 months, 2 weeks agopinderanttal
2 weeks, 2 days agoFart2023
3 months, 2 weeks agoHunterxSeb
5 months, 1 week agoElDirec
11 months, 3 weeks agoLiveLaughToasterBath
11 months, 3 weeks ago[Removed]
1 year, 1 month agoDRVision
1 year, 1 month agoMysterClyde
1 year, 7 months agosurfuganda
9 months, 3 weeks agotaylorhung
1 year, 1 month agoTheSkyMan
1 year, 9 months agocy_analyst
1 year, 10 months ago[Removed]
1 year, 10 months agoKingIT_ENG
1 year, 10 months agoFrog_Man
1 year, 10 months ago[Removed]
1 year, 10 months ago2Fish
1 year, 11 months ago2Fish
1 year, 11 months ago[Removed]
1 year, 11 months agouser82
10 months, 3 weeks agoRightAsTain
2 years, 3 months ago