- Name: Nmap
- Profile: tryhackme.com
- Difficulty: Easy
- Description: Part of the Red Primer series, intro to scanning
Install tools used in this WU on BlackArch Linux:
pikaur -S nmap
Disclaimer: The answer essentially requires to search for options in the man page so it doesn't need a detailed write-up.
[Task 2] Nmap Quiz#
First, how do you access the help menu?
Often referred to as a stealth scan, what is the first switch listed for a 'Syn Scan'?
Not quite as useful but how about a 'UDP Scan'?
What about operating system detection?
How about service version detection?
Most people like to see some output to know that their scan is actually doing things, what is the verbosity flag?
What about 'very verbose'? (A personal favorite)
Sometimes saving output in a common document format can be really handy for reporting, how do we save output in xml format?
Aggressive scans can be nice when other scans just aren't getting the output that you want and you really don't care how 'loud' you are, what is the switch for enabling this?
How do I set the timing to the max level, sometimes called 'Insane'?
What about if I want to scan a specific port?
How about if I want to scan every port?
What if I want to enable using a script from the nmap scripting engine? For this, just include the first part of the switch without the specification of what script to run.
What if I want to run all scripts out of the vulnerability category?
What switch should I include if I don't want to ping the host?
[Task 3] Nmap Scanning#
Let's go ahead and start with the basics and perform a syn scan on the box provided. What will this command be without the host IP address?
After scanning this, how many ports do we find open under 1000?
What communication protocol is given for these ports following the port number?
Perform a service version detection scan, what is the version of the software running on port 22?
$ sudo nmap -sV 10.10.8.168
Perform an aggressive scan, what flag isn't set under the results for port 80?
p sudo nmap -A 10.10.8.168
Perform a script scan of vulnerabilities associated with this box, what denial of service (DOS) attack is this box susceptible to? Answer with the name for the vulnerability that is given as the section title in the scan output. A vuln scan can take a while to complete. In case you get stuck, the answer for this question has been provided in the hint, however, it's good to still run this scan and get used to using it as it can be invaluable.