ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 325 - PT0-002 discussion

Report
Export

During a vulnerability scan a penetration tester enters the following Nmap command against all of the non-Windows clients:

nmap -sX -T4 -p 21-25, 67, 80, 139, 8080 192.168.11.191

The penetration tester reviews the packet capture in Wireshark and notices that the target responds with an RST packet flag set for all of the targeted ports. Which of the following does this information most likely indicate?

A.
All of the ports in the target range are closed.
Answers
A.
All of the ports in the target range are closed.
B.
Nmap needs more time to scan the ports in the target range.
Answers
B.
Nmap needs more time to scan the ports in the target range.
C.
The ports in the target range cannot be scanned because they are common UDP ports.
Answers
C.
The ports in the target range cannot be scanned because they are common UDP ports.
D.
All of the ports in the target range are open
Answers
D.
All of the ports in the target range are open
Suggested answer: A

Explanation:

The Nmap command uses the Xmas scan technique, which sends packets with the FIN, PSH, and URG flags set. This is an attempt to bypass firewall rules and elicit a response from open ports. However, if the target responds with an RST packet, it means that the port is closed. Open ports will either ignore the Xmas scan packets or send back an ACK packet. Therefore, the information most likely indicates that all of the ports in the target range are closed.

Reference: [Nmap Scan Types], [Nmap Port Scanning Techniques], [CompTIA PenTest+ Study Guide: Exam PT0-002, Chapter 4: Conducting Passive Reconnaissance, page 127]

asked 02/10/2024
Muhanad Mohamed
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first