đŸš©
THM Walkthroughs
  • THM Walkthroughs
    • đŸ§‘â€đŸ«Tutorial
  • 🟩Difficulty: Info
    • 🔌What is Networking?
    • 🔌Intro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • đŸȘŸWindows Fundamentals
      • đŸȘŸWindows Fundamentals 1
      • đŸȘŸWindows Fundamentals 2
      • đŸȘŸWindows Fundamentals 3
    • 🔓Principles of Security
    • 🐍Python Basics
    • 🔍History of Malware
    • đŸŠčCommon Attacks
    • đŸ–„ïžSecurity Awareness
    • ⚔Intro to Offensive Security
    • đŸŠčPentesting Fundamentals
    • 🔓CVE Walkthroughs
      • đŸ–„ïžSudo Security Bypass: CVE-2019-14287
      • đŸ–„ïžSudo Buffer Overflow: CVE-2019-18634
      • đŸ–„ïžBaron Samedit: CVE-2021-3156
      • đŸ–„ïžOverlayFS: CVE-2021-3493
      • đŸ–„ïžPolkit: CVE-2021-3560
      • đŸ–„ïžPwnkit: CVE-2021-4034
      • đŸȘ¶Apache HTTP Server Path Traversal: CVE-2021-41773/42013
      • đŸ§»Dirty Pipe: CVE-2022-0847
      • 🟱Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‎Bypass Disable Functions
    • đŸŽŸïžTHM PROMOs
      • đŸŽŸïžLearn and win prizes [PROMO ENDED]
      • đŸŽŸïžLearn and win prizes #2 [PROMO ENDED]
  • đŸŸ©Difficulty: Easy
    • 🚀Learning Cyber Security
    • 🔁The Hacker Methodology
    • 🔍Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • 📡Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • 📡RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • 🐙Crack the hash
    • 🌍OhSINT
    • 🧑‍🚀Vulnversity
    • 🧊Ice
    • đŸȘŸBlue
    • 🎄Advent of Cyber 4 (2022)
  • 🟹Difficulty: Medium
    • đŸȘŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • 💀Mr Robot CTF
    • 🛗Linux PrivEsc
    • 🛗Linux PrivEsc Arena [WIP]
    • 🛗Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • đŸŸ„Difficulty: Insane
    • â›șYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • What is the first switch listed in the help menu for a 'Syn Scan' (more on this later!)?
  • Which switch would you use for a "UDP scan"?
  • If you wanted to detect which operating system the target is running on, which switch would you use?
  • Nmap provides a switch to detect the version of the services running on the target. What is this switch?
  • The default output provided by nmap often does not provide enough information for a pentester. How would you increase the verbosity?
  • Verbosity level one is good, but verbosity level two is better! How would you set the verbosity level to two? (Note: it's highly advisable to always use at least this option)
  • What switch would you use to save the nmap results in three major formats?
  • What switch would you use to save the nmap results in a "normal" format?
  • A very useful output format: how would you save results in a "grepable" format?
  • How would you activate this setting?
  • How would you set the timing template to level 5?
  • How would you tell nmap to only scan port 80?
  • How would you tell nmap to scan ports 1000-1500?
  • How would you tell nmap to scan all ports?
  • How would you activate a script from the nmap scripting library (lots more on this later!)?
  • How would you activate all of the scripts in the "vuln" category?
  1. Difficulty: Easy
  2. Nmap

Task 3 - Nmap Switches

PreviousTask 2 - IntroductionNextTask 5 - TCP Connect Scans

Last updated 3 years ago

What is the first switch listed in the help menu for a 'Syn Scan' (more on this later!)?

Reveal Flag

-sS

Which switch would you use for a "UDP scan"?

If you wanted to detect which operating system the target is running on, which switch would you use?

Nmap provides a switch to detect the version of the services running on the target. What is this switch?

The default output provided by nmap often does not provide enough information for a pentester. How would you increase the verbosity?

Verbosity level one is good, but verbosity level two is better! How would you set the verbosity level to two? (Note: it's highly advisable to always use at least this option)

Verbosity and debugging options

-v (Increase verbosity level) , -v (Set verbosity level)

Increases the verbosity level, causing Nmap to print more information about the scan in progress. Open ports are shown as they are found and completion time estimates are provided when Nmap thinks a scan will take more than a few minutes. Use it twice or more for even greater verbosity: -vv, or give a verbosity level directly, for example -v3.

We should always save the output of our scans -- this means that we only need to run the scan once (reducing network traffic and thus chance of detection), and gives us a reference to use when writing reports for clients.

What switch would you use to save the nmap results in three major formats?

As a convenience, you may specify -oA to store scan results in normal, XML, and grepable formats at once. They are stored in .nmap, .xml, and .gnmap, respectively.

What switch would you use to save the nmap results in a "normal" format?

A very useful output format: how would you save results in a "grepable" format?

Sometimes the results we're getting just aren't enough. If we don't care about how loud we are, we can enable "aggressive" mode. This is a shorthand switch that activates service detection, operating system detection, a traceroute and common script scanning.

How would you activate this setting?

-A: Enable OS detection, version detection, script scanning, and traceroute

Nmap offers five levels of "timing" template. These are essentially used to increase the speed your scan runs at. Be careful though: higher speeds are noisier, and can incur errors!

How would you set the timing template to level 5?

We can also choose which port(s) to scan.

How would you tell nmap to only scan port 80?

How would you tell nmap to scan ports 1000-1500?

A very useful option that should not be ignored:

How would you tell nmap to scan all ports?

So you can specify -p- to scan ports from 1 through 65535.

How would you activate a script from the nmap scripting library (lots more on this later!)?

How would you activate all of the scripts in the "vuln" category?

These scripts check for specific known vulnerabilities and generally only report results if they are found. Examples include realvnc-auth-bypass and afp-path-vuln.

HINT: There are two variants of this switch. One with a space, one with the equals sign. Look at the asterisks in the answer field to see which one it is.

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

-sU

-O

-sV

-v

-vv

-oA

-oN

-oG

-A

-T5

-p 80

-p 1000-1500

-p-

--script

--script=vuln

đŸŸ©
📡
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
TCP SYN (Stealth) Scan (-sS) | Nmap Network Scanning
https://nmap.org/book/synscan.html
UDP Scan (-sU) | Nmap Network Scanning
https://nmap.org/book/scan-methods-udp-scan.html
Usage and Examples | Nmap Network Scanning
https://nmap.org/book/osdetect-usage.html#osdetect-ex-scanme1
Service and Version Detection | Nmap Network Scanning
https://nmap.org/book/man-version-detection.html
Output | Nmap Network Scanning
https://nmap.org/book/man-output.html
Command-line Flags | Nmap Network Scanning
Command-line Flags | Nmap Network Scanning
https://nmap.org/book/output-formats-commandline-flags.html#output-formats-flags-verbosity
https://nmap.org/book/output-formats-commandline-flags.html#output-formats-flags-verbosity
Normal Output (-oN) | Nmap Network Scanning
https://nmap.org/book/output-formats-normal-output.html
Grepable Output (-oG) | Nmap Network Scanning
https://nmap.org/book/output-formats-grepable-output.html
nmap(1) - Linux man page
https://linux.die.net/man/1/nmap
Logo
Timing Templates (-T) | Nmap Network Scanning
https://nmap.org/book/performance-timing-templates.html
Port Specification and Scan Order | Nmap Network Scanning
Port Specification and Scan Order | Nmap Network Scanning
https://nmap.org/book/man-port-specification.html
https://nmap.org/book/man-port-specification.html
Nmap Scripting Engine (NSE) | Nmap Network Scanning
https://nmap.org/book/man-nse.html
Usage and Examples | Nmap Network Scanning
https://nmap.org/book/nse-usage.html#nse-category-vuln
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo