ExamGecko
Question list
Search
Search

Related questions











Question 230 - 312-50v12 discussion

Report
Export

Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure.

Jim used Nmap to scan open pons and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered Information such as the vendor name, product code and name, device name, and IP address. Which of the following Nmap commands helped Jim retrieve the required information?

A.
nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
Answers
A.
nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
B.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >
Answers
B.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >
C.
nmap -Pn -sT -p 46824 < Target IP >
Answers
C.
nmap -Pn -sT -p 46824 < Target IP >
D.
nmap -Pn -sT -p 102 --script s7-info < Target IP >
Answers
D.
nmap -Pn -sT -p 102 --script s7-info < Target IP >
Suggested answer: B

Explanation:

https://nmap.org/nsedoc/scripts/enip-info.html

Example Usage enip-info:

- nmap --script enip-info -sU -p 44818 This NSE script is used to send a EtherNet/IP packet to a remote device that has TCP 44818 open. The script will send a Request Identity Packet and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. Information that is parsed includes Device Type, Vendor ID, Product name, Serial Number, Product code, Revision Number, status, state, as well as the Device IP.

This script was written based of information collected by using the the Wireshark dissector for CIP, and EtherNet/IP, The original information was collected by running a modified version of the ethernetip.py script (https://github.com/ paperwork/pyenip)

asked 18/09/2024
francesca parisi
25 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first