Nmap Flashcards

1
Q

How do you perform a Nmap Host Discovery Scan?

A

nmap –sn {ip_range}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Nmap switch performs a List Scan that lists IP addresses from the supplied target range(s) and performs a reverse-DNS query to discover any host names associated with those IPs?

A

-sL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Nmap switch performs a TCP SYN ping that probes specific ports from the given list using a TCP SYN packet instead of an ICMP packet to conduct the ping?

A

-PS <PortList></PortList>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Nmap switch performs a Sparse Scan which issues probes with significant delays to become stealthier and avoid detection by an IDS or IPS?

A

–scan-delay <Time></Time>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Nmap switch performs a Scan Timing that issues probes with using a timing pattern?

A

-Tn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Best use case for -T0 and -T1?

A

For evading an IDS, but extremely slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the best use case for -T2 ?

A

Slows the scan to conserve bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best use case for -T3?

A

The default and most stable scanning timing option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best use case for -T4?

A

For a faster scan that is still relatively stable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best use case -T5?

A

Fastest scanning option but can be unstable if network or the target network’s speed cannot maintain the timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Nmap switch performs a TCP Idle Scan stealth method, makes it appear that another machine (a zombie) started the scan to hide the true identity of the scanning machine?

A

-sI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Nmap switch performs a Fragmentation technique that splits the TCP header of each probe between multiple IP datagrams to make it hard for an IDS or IPS to detect?

A

-f or –mtu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four ways Nmap can output results?

A

1.Interactive (default) to screen
2. Normal (-oN) to file
3. XML (-oX) to file
4. Grepable (-oG) to file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Nmap switch performs a TCP SYN and conducts a half-open scan by sending a SYN packet to identify the port state without sending an ACK packet afterwards?

A

-sS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What Nmap switch performs a TCP Connect and conducts a three-way handshake scan by sending a SYN packet to identify the port state and then sending an ACK packet once the SYN-ACK is received?

A

-sT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Nmap switch performs a Null Scan that conducts a scan by sending a packet with the header bit set to zero?

A

-sN

17
Q

What Nmap switch performs a FIN Scan and conducts a scan by sending an unexpected FIN packet?

A

-sF

18
Q

What Nmap switch performs a Xmas Scan and conducts a scan by sending a packet with the FIN, PSH, and URG flags set to one?

A

-sX

19
Q

What Nmap switch performs a UDP Scan conducts a scan by sending a UDP packet to the target and waiting for a response or timeout?

A

-sU

20
Q

What Nmap switch performs a Port Range and conducts a scan by targeting the specified ports instead of the default 1,000 most commonly used ports?

A

-p

21
Q

Which Nmap switch will probe port intensely?

A

nmap –A OR nmap –sV

22
Q

How does Nmap fingerprint what services and versions are running?

A

Common Platform Enumeration (CPE)