ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 347 - PT0-002 discussion

Report
Export

During a vulnerability scan a penetration tester enters the following Nmap command against all of the non-Windows clients:

nmap -sX -T4 -p 21-25, 67, 80, 139, 8080 192.168.11.191

The penetration tester reviews the packet capture in Wireshark and notices that the target responds with an RST packet flag set for all of the targeted ports. Which of the following does this information most likely indicate?

A.
All of the ports in the target range are closed.
Answers
A.
All of the ports in the target range are closed.
B.
Nmap needs more time to scan the ports in the target range.
Answers
B.
Nmap needs more time to scan the ports in the target range.
C.
The ports in the target range cannot be scanned because they are common UDP ports.
Answers
C.
The ports in the target range cannot be scanned because they are common UDP ports.
D.
All of the ports in the target range are open.
Answers
D.
All of the ports in the target range are open.
Suggested answer: A

Explanation:

The -sX flag in Nmap performs a Xmas scan, which sends packets with the FIN, PSH, and URG flags set. This is an attempt to bypass firewalls and IDS/IPS devices by using a non-standard TCP packet. However, if the target port is closed, it will respond with a RST (reset) packet, indicating that there is no connection to be closed. This is how the penetration tester can infer that the ports in the target range are closed. If the port is open, the target will ignore the packet and not send any response.

Reference:

* Nmap Cheat Sheet 2024: All the Commands & Flags - StationX

* Nmap Commands - 17 Basic Commands for Linux Network - phoenixNAP

* NMAP Flag Guide: What They Are, When to Use Them - CBT Nuggets

* [The Official CompTIA PenTest+ Self-Paced Study Guide (Exam PT0-002)], Chapter 4: Conducting Active Scanning, page 151.

asked 02/10/2024
Loris Pastro
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first