2.4 Information gathering & Vulnerability scanning: Nmap Flashcards
Nmap Discovery Scans: what is Nmap Security Scanner?
▪ A versatile port scanner used for topology, host, service, and OS discovery and enumeration
▪ An nmap discovery scan is used to footprint the network
Nmap Discovery Scans: give the basic syntax for running nmap scan
nmap {IP}
ex: nmap 192.168.1.0/24
Nmap Discovery Scans: give the syntax for running a host discovery scan on nmap
nmap –sn {IP}
ex: nmap –sn 192.168.1.0/24
Nmap Discovery Scans: what -sn stands for?
No port scan.
This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the host discovery probes. This is often known as a “ping scan”.
Nmap Discovery Scans: what -sL stands for ?
List Scan (-sL)
Lists the IP addresses from the supplied target range(s) and performs a reverse-DNS query to discover any host names associated with those IPs
Nmap Discovery Scans: what -PS <PortList> used for ?</PortList>
TCP SYN ping (-PS <PortList>)
Probes (=research/ explore) specific ports from the given list using a TCP SYN packet instead of an ICMP packet to conduct the ping</PortList>
Nmap Discovery Scans: what –scan-delay <Time> used for ?</Time>
Issues probes (=research/ explore) with significant delays to become stealthier and avoid detection by an IDS or IPS
Nmap Discovery Scans: what -Tn used for ?
Scan Timing (-Tn)
Issues probes with using a timing pattern with n being the pattern to utilize (0 is slowest and 5 is fastest)
Nmap Discovery Scans: what -sl used for ?
TCP Idle Scan (-sI)
Another stealth method, this scan makes it appear that another machine (a zombie) started the scan to hide the true identity of the scanning machine
Nmap Discovery Scans: what -f or –mtu used for ?
Fragmentation (-f or –mtu)
A technique that splits the TCP header of each probe between multiple IP datagrams to make it hard for an IDS or IPS to detect
Nmap Discovery Scans: what are the expected results of a nmap discovery scan?
The results of a discovery scan should be a list of IP addresses and whether they responded to the probes
Nmap Discovery Scans: how can you see the output of the scan and what are the proposed format (5)?
▪ Interactive (default) to screen
▪ Normal (-oN) to file
▪ XML (-oX) to file
▪ Grepable (-oG) to file
▪ XML or grepable output can be integrating with most SIEM products
Nmap Port Scans: when should you run a nmap port scan?
After your footprinting is complete, it is time to begin fingerprinting hosts
Nmap Port Scans: what it is used for ?
▪ Determine which network services and operating systems are in use by a target
▪ Service discovery can take minutes to hours to complete
Nmap Port Scans: what’s -sS used for?
TCP SYN (-sS)
In this type of scan, Nmap sends a SYN packet to the target port and analyzes the response to determine if the port is open, closed, or filtered by a firewall. This scan is fast and discreet, making it useful for network mapping and discovering online devices.