NMAP Flashcards

1
Q

Port Scan Type: Full Connect

A

AKA Tcp Connect or Full Open Scan. complete 3-way handshake torn down with RST. Easist to detect but most reliable. Open port respond with SYN\ACK– closed with RST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port Scan Type: Stealth

A

AKA SYN scan or Half-open scan. Only SYN are sent. Open gets a syn/ack closed gets rst. Better at hiding scan and bypassing firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Scan Type: Inverse TCP Flag

A

AKA Null or FIN scan Uses FIN URG or PSH flag or none at all. Open port gets no response. Closed gets RST/ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port Scan Type: XMAS

A

XMAS URG, PSH FIN, flags are on. Open gets no response. closed gets RST/Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port Scan Type: ACK Flag Probe

A

Probe with ACK. Look at return RST packet if TTL is less than 64 or the WINDOW size has anything other than 0 in it it is open. Also can be used to check filtering if there is no response there is a stateful firewall between attacker and host if a RST comes back there is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmap switch: -sA

A

ACK scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nmap switch: -sF

A

FIN Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nmap switch: -sI

A

IDLE Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nmap switch: -sL

A

DNS or list scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nmap switch: -sN

A

Null scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Nmap switch: -sO

A

Protocol Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nmap switch: -sP

A

Ping scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nmap switch: -sR

A

RPC Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nmap switch: -sS

A

Syn scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nmap switch: -sT

A

TCP full connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nmap switch: -sW

A

Window scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Nmap switch: -sX

A

Xmas Scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Nmap switch: -PI -PE -PM -PP

A

ICMP ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Nmap switch: -Po -PN

A

no ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Nmap switch: -PS

A

Syn Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nmap switch: -PT

A

TCP ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Nmap switch: -oN

A

Normal output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Nmap switch: -oX

A

XML output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Nmap switch: -oG

A

GREPable output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Nmap switch: -oA

A

All formats including script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Nmap switch: -O

A

OS finger printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Nmap switch: -A

A

aggressive scan includes version scan, script, protocol, and traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Nmap switch: -F

A

Fast limited ports only 100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Nmap switch: -P

A

port range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Nmap switch: -iL

A

input from list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Nmap switch: -PR

A

ARP ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Nmap switch: -f

A

Fragment package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Nmap switch: -T0

A

Serial slowest Paranoid 5 min between probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Nmap switch: -T1

A

serial slowest Sneaky 15 seconds between probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Nmap switch: -T2

A

Serial slow normal speed Polite .4 sec (400 mil seconds) between probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Nmap switch:-T3

A

Parallel normal speed default (max delay of 1 sec )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Nmap switch:-T4

A

parallel fast scan aggressive max delay of 10 milsec)

38
Q

nmap: -T5

A

insane mode caps and delay at 5ms

39
Q

Nmap switch: -R -n

A

Dns resolution for everything and no DNS resolution for anything

40
Q

Nmap switch: -D RND:10.0.0.0

A

creates decoy random ips with attackers ip interspersed as well

41
Q

nmap –script http-trace -p80 localhost

A

detects server that uses trace

42
Q

nmap –script http-google-email

A

lists email accounts

43
Q

nmap –script hostmap-*

A

discovers virtual host the * is replaced with DB you are querying.

44
Q

nmap –script http-enum -p80

A

enumerates common web applications

45
Q

nmap -p 80 – script http-robots.txt

A

grabs robots.txt file

46
Q

Full Open Scan. complete 3-way handshake torn down with RST. Easist to detect but most reliable. Open port respond with SYN\ACK– closed with RST

A

Port Scan Type: Full Connect

47
Q

AKA SYN scan or Half-open scan. Only SYN are sent. Open gets a syn/ack closed gets rst. Better at hiding scan and bypassing firewalls

A

Port Scan Type: Stealth

48
Q

AKA Null or FIN scan Uses FIN URG or PSH flag or none at all. Open port gets no response. Closed gets RST/ACK

A

Port Scan Type: Inverse TCP Flag

49
Q

URG, PSH FIN, flags are on. Open gets no response. closed gets RST/Ack

A

Port Scan Type: XMAS

50
Q

Look at return RST packet if TTL is less than 64 or the WINDOW size has anything other than 0 in it it is open. Also can be used to check filtering if there is no response there is a stateful firewall between attacker and host if a RST comes back there is not

A

Port Scan Type: ACK Flag Probe

51
Q

ACK scan

A

Nmap switch: -sA

52
Q

FIN Scan

A

Nmap switch: -sF

53
Q

IDLE Scan

A

Nmap switch: -sI

54
Q

DNS or list scan.

A

Nmap switch: -sL

55
Q

Null scan

A

Nmap switch: -sN

56
Q

Protocol Scan

A

Nmap switch: -sO

57
Q

Ping scan

A

Nmap switch: -sP

58
Q

RPC Scan

A

Nmap switch: -sR

59
Q

Syn scan

A

Nmap switch: -sS

60
Q

TCP full connect

A

Nmap switch: -sT

61
Q

Window scan

A

Nmap switch: -sW

62
Q

Xmas Scan

A

Nmap switch: -sX

63
Q

ICMP ping

A

Nmap switch: -PI -PE -PM -PP

64
Q

no ping

A

Nmap switch: -Po -PN

65
Q

Syn Ping

A

Nmap switch: -PS

66
Q

TCP ping

A

Nmap switch: -PT

67
Q

Normal output

A

Nmap switch: -oN

68
Q

XML output

A

Nmap switch: -oX

69
Q

GREPable output

A

Nmap switch: -oG

70
Q

All formats including script kiddie

A

Nmap switch: -oA

71
Q

OS finger printing

A

Nmap switch: -O

72
Q

scan includes version scan, script, protocol, and traceroute

A

Nmap switch: -A

73
Q

Fast limited ports only 100

A

Nmap switch: -F

74
Q

port range

A

Nmap switch: -P

75
Q

input from list

A

Nmap switch: -iL

76
Q

ARP ping

A

Nmap switch: -PR

77
Q

Fragment package

A

Nmap switch: -f

78
Q

Serial slowest Paranoid 5 min between probes

A

Nmap switch: -T0

79
Q

serial slowest Sneaky 15 seconds between probes

A

Nmap switch: -T1

80
Q

Serial slow normal speed Polite .4 sec (400 mil seconds) between probes

A

Nmap switch: -T2

81
Q

Parallel normal speed default (max delay of 1 sec )

A

Nmap switch:-T3

82
Q

parallel fast scan aggressive max delay of 10 milsec

A

Nmap switch:-T4

83
Q

insane mode caps and delay at 5ms

A

nmap: -T5

84
Q

Dns resolution for everything and no DNS resolution for anything

A

Nmap switch: -R -n

85
Q

creates decoy random ips with attackers ip interspersed as well

A

Nmap switch: -D RND:10.0.0.0

86
Q

detects server that uses trace

A

nmap –script http-trace -p80 localhost

87
Q

lists email accounts

A

nmap –script http-google-email

88
Q

discovers virtual host the * is replaced with DB you are querying.

A

nmap –script hostmap-*

89
Q

enumerates common web applications

A

nmap –script http-enum -p80

90
Q

grabs robots.txt file

A

nmap –script http-robots.txt

91
Q

Nmap switch: -sC

A

Script Scan