0% found this document useful (0 votes)
155 views4 pages

Ns Lab 2

Port scanning is a method that allows an attacker to determine which ports are open on a target server. By learning details about the software and services running on publicly accessible ports, an attacker can gain a better understanding of where and how to attack the victim server. Port scanning takes advantage of conventions in TCP and ICMP protocols to provide information about why connection attempts failed.

Uploaded by

Deepanshu Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
155 views4 pages

Ns Lab 2

Port scanning is a method that allows an attacker to determine which ports are open on a target server. By learning details about the software and services running on publicly accessible ports, an attacker can gain a better understanding of where and how to attack the victim server. Port scanning takes advantage of conventions in TCP and ICMP protocols to provide information about why connection attempts failed.

Uploaded by

Deepanshu Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Port scanning is a method that can be used by an attacker to probe which ports are open on a given

host, learning details about which software the server is running on publicly addressable interfaces.

With this information, an attacker gains a better understanding of where and how to attack the
victim server. Port scanning takes advantage of conventions in TCP and ICMP that seek to provide a
sender with (perhaps too much!) information on why their connection failed.
1. What is the full command you used to run the port scan (including arguments)?

A sudo nmap -sS -A 45.33.32.156 -T4

2. What is the IP address of scanme.nmap.org?

A 45.33.32.156

3. What ports are open on the target server? What applications are running on those ports?

A 22/tcp is open and OpenSSH ubuntu is running

80/tcp is open and Apache is tunning

9929 is open

31337 is open

You might also like