RP: Nmap — TryHackMe

RP: Nmap — TryHackMe

Part of the Red Primer series, intro to scanning.

LAB Access: https://tryhackme.com/room/rpnmap

Video Access: https://www.youtube.com/watch?v=Dj2lF4bt6Po

First, how do you access the help menu? nmap -h
Often referred to as a stealth scan, what is the first switch listed for a ‘Syn Scan’? -sS

Not quite as useful but how about a ‘UDP Scan’? -sU

What about operating system detection? -O

How about service version detection? -sV

Most people like to see some output to know that their scan is actually doing things, what is the verbosity flag? -v

What about ‘very verbose’? (A personal favorite) -vv
Sometimes saving output in a common document format can be really handy for reporting, how do we save output in xml format? -oX

Aggressive scans can be nice when other scans just aren’t getting the output that you want and you really don’t care how ‘loud’ you are, what is the switch for enabling this?

How do I set the timing to the max level, sometimes called ‘Insane’? -T5

What about if I want to scan a specific port? -p

How about if I want to scan every port? -p-

What if I want to enable using a script from the nmap scripting engine? For this, just include the first part of the switch without the specification of what script to run.
 — script

What if I want to run all scripts out of the vulnerability category? — script vuln

What switch should I include if I don’t want to ping the host? -Pn

[Task 3] Nmap Scanning

Let’s go ahead and start with the basics and perform a syn scan on the box provided. What will this command be without the host IP address?
nmap -sS

After scanning this, how many ports do we find open under 1000? 2

What communication protocol is given for these ports following the port number? tcp

Perform a service version detection scan, what is the version of the software running on port 22? 6.6.1p1

Perform an aggressive scan, what flag isn’t set under the results for port 80? httponly

Perform a script scan of vulnerabilities associated with this box, what denial of service (DOS) attack is this box susceptible to? Answer with the name for the vulnerability that is given as the section title in the scan output. A vuln scan can take a while to complete. In case you get stuck, the answer for this question has been provided in the hint, however, it’s good to still run this scan and get used to using it as it can be invaluable.

Did you find this article valuable?

Support Cyber Security by becoming a sponsor. Any amount is appreciated!