ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 57 - PT0-002 discussion

Report
Export

A penetration tester is scanning a corporate lab network for potentially vulnerable services. Which of the following Nmap commands will return vulnerable ports that might be interesting to a potential attacker?

A.
nmap 192.168.1.1-5 -PU22-25,80
Answers
A.
nmap 192.168.1.1-5 -PU22-25,80
B.
nmap 192.168.1.1-5 -PA22-25,80
Answers
B.
nmap 192.168.1.1-5 -PA22-25,80
C.
nmap 192.168.1.1-5 -PS22-25,80
Answers
C.
nmap 192.168.1.1-5 -PS22-25,80
D.
nmap 192.168.1.1-5 -Ss22-25,80
Answers
D.
nmap 192.168.1.1-5 -Ss22-25,80
Suggested answer: C

Explanation:

PS/PA/PU/PY are host discovery flags which use TCP SYN/ACK, UDP or SCTP discovery respectively.

And since the ports in the options are mostly used by TCP protocols, then it's either the PS or PA flag.

But since we need to know if the ports are live, sending SYN packet is a better alternative. Hence, I choose PS in this case.

The nmap -PS22-25,80 192.168.1.1-5 command will return vulnerable ports that might be interesting to a potential attacker, as it will perform a TCP SYN scan on ports 22, 23, 24, 25, and 80 of the target hosts. A TCP SYN scan is a stealthy technique that sends a SYN packet to each port and waits for a response. If the response is a SYN/ACK packet, it means the port is open and listening for connections. If the response is a RST packet, it means the port is closed and not accepting connections. If there is no response, it means the port is filtered by a firewall or IDS1.

asked 02/10/2024
Michael Thornton
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first