Ns Lab 2
Ns Lab 2
host, learning details about which software the server is running on publicly addressable interfaces.
With this information, an attacker gains a better understanding of where and how to attack the
victim server. Port scanning takes advantage of conventions in TCP and ICMP that seek to provide a
sender with (perhaps too much!) information on why their connection failed.
1. What is the full command you used to run the port scan (including arguments)?
A 45.33.32.156
3. What ports are open on the target server? What applications are running on those ports?
9929 is open
31337 is open