ExamGecko
Question list
Search
Search

Related questions











Question 521 - 312-50v12 discussion

Report
Export

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

A.
Hping3 -110.0.0.25 --ICMP
Answers
A.
Hping3 -110.0.0.25 --ICMP
B.
Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4
Answers
B.
Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4
C.
Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood
Answers
C.
Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood
D.
Hping3-210.0.0.25-p 80
Answers
D.
Hping3-210.0.0.25-p 80
Suggested answer: C

Explanation:

The command C. Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood is the correct one to spoof IP addresses for anonymity during probing. This command sends SYN packets (-S) to the target IP 192.168.1.1 with a spoofed source IP (-a) 192.168.1.254 on port 22 (-p) and floods the target with packets (-flood).This way, the CEH can hide his real IP address and avoid detection by the target's firewall or IDS12.

The other commands are incorrect for the following reasons:

A) Hping3 -110.0.0.25 --ICMP: This command sends ICMP packets (--ICMP) to the target IP 10.0.0.25, but does not spoof the source IP. Therefore, the CEH's real IP address will be exposed to the target.

B) Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4: This command performs a stealthy SYN scan (-sS) on all ports (-p-) of the target without pinging it (-Pn) or resolving DNS names (-n). It also enables verbose output (-v), packet tracing (--packet-trace), and discovery scripts (--script discovery) with an aggressive timing (-T4). However, this command does not spoof the source IP, and in fact, reveals more information about the scan to the target by using packet tracing and discovery scripts.

D) Hping3-210.0.0.25-p 80: This command sends TCP packets (default) to the target IP 10.0.0.25 on port 80 (-p), but does not spoof the source IP. Therefore, the CEH's real IP address will be exposed to the target.

1: Master hping3 and Enhance Your Network Strength | GoLinuxCloud

2: Spoofing Packets with Hping3 - YouTube

asked 18/09/2024
Andres Romo
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first