1- An attacker has discovered a vulnerable computer with the IP address 192.168.201.10. What tool might the...

Question:

1- An attacker has discovered a vulnerable computer with the IP address 192.168.201.10. What tool might the attacker use to determine if there are other vulnerable computers on the network, and what command would the attacker use?
2- What Nmap option would you use if you wanted to perform a TCP port scan?
3- How would you use Nmap to perform a TCP port scan on a computer with the IP address 192.168.220.101?
4- At the command line, type nmap. What option can you use to perform a UDP port scan? A TCP SYN stealth port scan?
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Principles Of Information Security

ISBN: 9780357506431

7th Edition

Authors: Michael E. Whitman, Herbert J. Mattord

Question Posted: