Question
1. In Part 1, Step 12, you used nmap without any options, and then in Step 19, you used the nmap command with the sT
1. In Part 1, Step 12, you used nmap without any options, and then in Step 19, you used the nmap command with the sT option. Enter your answers in the table below:
What does the sT option of nmap do? |
|
How does the sT option compare to the nmap scan without the option? |
|
Does this match your expectations, why or why not? |
|
2. In Part 1, Step 23, you ran the nmap with the F option. Enter your answers in the table below:
What does the F option of nmap do? |
|
How does the F option compare to the nmap scan with the sT option? |
|
Does this match your expectations, why or why not? |
|
3. In Part 1, Step 24, you ran the nmap command with the A option.
What does the A option do? |
|
What is running on port 139 and what does it do? |
|
What is running on port 143 and what does it do? |
|
One of the two ports is running software which is vulnerable. Which, and what is the vulnerability? |
|
4.
In the very last step of the lab, Part 2, Step 5, you performed the command
amap B 192168.68.12 22
It performs what is known as banner grabbing. Explain what banner grabbing is and how it can be used in an attack. Describe the information that was grabbed when you performed the command.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started