A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?
D is the only answer that doesnt actually RUN so I dont see why that's the majority answer.
Looking at nmap --help clearly shows:
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
We want TCP, so -PS will do the job.
So I have to say C.
The correct answer is D. nmap 192.168.1.1-5 -Ss22-25,80. This command will perform a SYN scan of ports 22 through 25 and port 80 on the IP addresses 192.168.1.1 through 192.168.1.5. This scan will return any potentially vulnerable ports that might be of interest to an attacker.
The capital 'S' stands for the SYN flag, which is used to initiate a connection on a TCP port. The lowercase 's' stands for the stealth flag, which is used to hide the source IP address of the scan and make it harder to detect.
the answere "C" say: _PS that is a ping scan, specified on the port after listed.
the answer "D" it's incorrect because do non exist a command -Ss 'cause nmap it's case-sensitive and give you back an error.
you can try as a proof.
The -sS scan (commonly called a SYN scan) is the best option for identifying vulnerable ports, as it actively scans the target ports and detects open services. This scan is non-intrusive and efficient, making it a preferred method for penetration testers to enumerate services and locate potential attack vectors.
To further refine the scan for vulnerable services, additional options such as -sV (version detection) and --script=vuln (vulnerability scanning scripts) can be added:
nmap -sS -sV --script=vuln 192.168.1.1-5 -p22-25,80
-PS is the best switch for Host Discovery which is what this question requires.
-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
The command provided in Option D, nmap 192.168.1.1-5 -Ss22-25,80, is not valid and would indeed not run as expected.
The correct syntax should be:
Copy code
nmap 192.168.1.1-5 -sS 22-25,80
The lowercase -sS specifies a TCP SYN scan, while the uppercase -Ss would be incorrect.
---------
The next best option would be:
C. nmap 192.168.1.1-5 -PS22-25,80
C. `nmap 192.168.1.1-5 -PS22-25,80`
Explanation:
- The `-PS` option performs a TCP SYN ping scan, which sends SYN packets to the specified ports (22-25,80) on the target hosts (192.168.1.1-5) to check if those ports are open.
- While this does not perform a full vulnerability scan, it is useful for identifying live hosts with open ports, which can be the first step in identifying potentially vulnerable services.
The other options (`-PU` for UDP ping and `-PA` for ACK ping) are less likely to be useful for identifying open ports and potentially vulnerable services in this context.
If the -sS option (note the correct lowercase -sS instead of -Ss) is a SYN scan, which is the most effective and common way to scan for open ports. This type of scan sends SYN packets to the specified ports and determines if they are open based on the responses, making it useful for identifying potentially vulnerable services.
The correct answer to the question is option B: nmap 192.168.1.1-5 "PA22-25,80". The "PA" option specifies a port scan and identifies services based on their response to specific probes. This scan will return open ports 22-25 and 80, and attempt to identify potential vulnerabilities in those services.
Nmap is a widely used tool for network discovery and security auditing. Different options can be used to perform various types of scans.
In the given context, you would likely want to use a stealthy SYN scan to identify open ports that might be running vulnerable services. The SYN scan is a popular method that's useful in port scanning as it doesn't complete the TCP handshake and is therefore considered "stealthier."
The correct option for performing a SYN scan over the specified range of IPs and ports would be:
D. `nmap 192.168.1.1-5 -sS 22-25,80`
Note the correct flag for a SYN scan is `-sS`, not `-Ss`. Therefore, it appears there may be a typographical error in the options provided, and based on the context, option D should be the correct choice if corrected to `-sS`.
The -sS option tells the nmap command to perform a TCP SYN scan, which is a stealthy way to scan a network. The 22-25,80 option tells the nmap command to scan the specified ports, which are commonly used by vulnerable services.
Option C, nmap 192.168.1.1-5 -PS22-25,80, will return all open ports that are listening for proxy services, which are not typically vulnerable.
They do a host discovery first and then they scan the ports, so sS and PS are essentially the same thing and they both send TCP Syn packets, except PS does a host discovery beforehand
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
The_F00L
Highly Voted 2 years, 2 months agorodwave
10 months, 3 weeks agoRRabbit_111
Highly Voted 2 years, 3 months agoKeToopStudy
1 year, 3 months agoEdoard_
Most Recent 2 weeks, 3 days agoPractice_all
2 months, 3 weeks agoLearner213
3 months, 3 weeks agozemijan
5 months, 3 weeks agoEtc_Shadow28000
6 months, 4 weeks agoPaula77
10 months agofecffa8
5 months, 1 week agoaa9ee6c
10 months, 2 weeks agoKirby87
1 year, 5 months agosolutionz
1 year, 8 months agonooooo
1 year, 9 months agoMysterClyde
1 year, 10 months agoPOWNED
1 year, 12 months agoKingIT_ENG
2 years, 1 month agokenechi
2 years, 1 month agodcyberguy
2 years, 5 months agoVikt0r
2 years, 2 months agoAhegi
2 years, 1 month agoBirdLawyer
10 months, 4 weeks ago