Question

Write the nmap scan command to run an aggressive, stealth scan for the full port range...

Write the nmap scan command to run an aggressive, stealth scan for the full port range against a target ip-192.168.10.20. The scan should also provide verbose output.

Homework Answers

Answer #1

nmap scan cmd to run the aggresive , steath scan with the verbose using "-v" tag in the command for the full the port range against a target ip : 192.168.10.20

nmap -v --top-ports 20 192.168.10.20


Explanation:

If we want to run nmap scan command on a home server, It is automatically scans a number of the most ‘popular’ ports for a given host 192.168.10.20 , replace the “20” with the number of range of the ports to scan using above nmap command , and nmap will scans that many ports given / provided in the command and It will returns a concise output that details the status of the most common ports using verbose "-v," tag provided in the command and this will quickly see whether we have any unnecessarily open ports or not.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Write the nmap scan command to run an aggressive, stealth scan for the full port range...
Write the nmap scan command to run an aggressive, stealth scan for the full port range against a target ip-192.168.10.20. The scan should also provide verbose output.
1.Write a for loop that displays the run number and your full name 5 times on...
1.Write a for loop that displays the run number and your full name 5 times on the command window. Your output should look similar to following: using matlab
Networking questions: 1. You need to perform a basic ping scan and write the output file...
Networking questions: 1. You need to perform a basic ping scan and write the output file to a text file named 10-PingSweep.txt. You must utilize a “for loop” with the ping command in windows. It should be for the following sweep – 192.168.111.1-254. Provide the command to be placed into a cmd.exe shell. (Note – only valid Reply responses should be in the text file. Your exact command will be tested.) 2. You are working on a potential incident response...
Run “netstat –an” on your own computer. On a computer running Microsoft Windows, open a command...
Run “netstat –an” on your own computer. On a computer running Microsoft Windows, open a command prompt. Often this can be done by going to the Start menu, then choosing Programs > Accessories > Command Prompt. The netstat command will actually work on many other operating systems, including Linux and Mac. The output will be something like below: Active Connections   Proto Local Address          Foreign Address        State TCP    0.0.0.0:135            0.0.0.0:0              LISTENING TCP    0.0.0.0:445            0.0.0.0:0              LISTENING TCP    0.0.0.0:2869           0.0.0.0:0              LISTENING TCP    0.0.0.0:38068         ...
The first script you need to write is login.sh, a simple script that you might run...
The first script you need to write is login.sh, a simple script that you might run when you first log in to a machine. We'll expand this script later, but for now it should include your name, username, hostname, current directory, and the current time. Here is some sample output to help guide you. Note that the bolded lines that start with "[user@localhost ~]$" are the terminal prompts where you type in a command, not part of the script. Of...
The code I have written runs but I need it us UDP not TCP. Also I...
The code I have written runs but I need it us UDP not TCP. Also I just need someone to check my work and make sure that it works properly. The python code needs to be run with command line so you can add more than one client. The directions: 1. The chat is performed between 2 clients and not the server. 2. The server will first start up and choose a port number. Then the server prints out its...
Please do the following in python: Write a program (twitter_sort.py) that merges and sorts two twitter...
Please do the following in python: Write a program (twitter_sort.py) that merges and sorts two twitter feeds. At a high level, your program is going to perform the following: Read in two files containing twitter feeds. Merge the twitter feeds in reverse chronological order (most recent first). Write the merged feeds to an output file. Provide some basic summary information about the files. The names of the files will be passed in to your program via command line arguments. Use...
PYTHON : Create a Email Address Parser (* Please do make comments*) Often times, you may...
PYTHON : Create a Email Address Parser (* Please do make comments*) Often times, you may be given a list of raw email addresses and be asked to generate meaningful information from such a list. This project involves parsing such a list and generating names and summary information from that list. The script, eparser.py, should: Open the file specified as the first argument to the script (see below) Read the file one line at a time (i.e., for line in...
      MK Restaurant: Branding of Thai-Style Hotpot The restaurant industry is one of the most...
      MK Restaurant: Branding of Thai-Style Hotpot The restaurant industry is one of the most competitive in Thailand. With a large number of players ranging from restaurants in five-star hotels, global fast-food chains to small stalls along the streets and everything in between, the Thais are spoiled for choice. In addition, as the world becomes globalized, consumers are familiar with international dishes and would not hesitate to try new offerings from the other side of the globe. As a...
Please show me how to apply CVP analysis for this case study. FLY ASH BRICK PROJECT:...
Please show me how to apply CVP analysis for this case study. FLY ASH BRICK PROJECT: FEASIBILITY STUDY USING CVP ANALYSIS S. K. Mitra and Shubhra Hajela wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be transmitted, photocopied, digitized or otherwise reproduced in any...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT