ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 298 - PT0-002 discussion

Report
Export

Drag Drop

You are a penetration tester running port scans on a server.

INSTRUCTIONS Part 1: Given the output, construct the command that was used to generate this output from the available options.

Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Question 298
Correct answer: Question 298

Explanation:

Part 1: nmap -sV -O --top-ports 100 192.168.2.2

Part 2: Weak SMB file permissions


https://subscription.packtpub.com/book/networking-and-servers/9781786467454/1/ch01lvl1sec13/fingerprinting-os-and-services-running-on-a-target-host


asked 02/10/2024
Maritza Van Der Merwe
36 questions
User
0 comments
Sorted by

Leave a comment first