Nmap Room WriteUp
This is my write ups for Nmap Room on Try Hack Me.
I will not go deep into why the answer is "x" or "y", that part is your job to understand what the room is trying to teach you.
Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.
Task 1 - Deploy
- Deploy the attached VM -
No answer needed
Task 2 - Introduction
What networking constructs are used to direct traffic to the right application on a server? -
Ports
How many of these are available on any network-enabled computer? -
65535
[Research] How many of these are considered "well-known"? (These are the "standard" numbers mentioned in the task) -
1024
Task 3 - Nmap Switches
What is the first switch listed in the help menu for a 'Syn Scan' (more on this later!)? -
-sS
Which switch would you use for a "UDP scan"? -
-sU
If you wanted to detect which operating system the target is running on, which switch would you use? -
-O
Nmap provides a switch to detect the version of the services running on the target. What is this switch? -
-sV
The default output provided by nmap often does not provide enough information for a pentester. How would you increase the verbosity? -
-v
Verbosity level one is good, but verbosity level two is better! How would you set the verbosity level to two?
- (Note: it's highly advisable to always use at least this option) -
-vv
- (Note: it's highly advisable to always use at least this option) -
What switch would you use to save the nmap results in three major formats? -
-oA
What switch would you use to save the nmap results in a "normal" format? -
-oN
A very useful output format: how would you save results in a "grepable" format? -
-oG
How would you activate this setting? -
-A
How would you set the timing template to level 5? -
-T5
How would you tell nmap to only scan port 80? -
-p 80
How would you tell nmap to scan ports 1000-1500? -
-p 1000-1500
How would you tell nmap to scan all ports? -
-p-
How would you activate a script from the nmap scripting library (lots more on this later!)? -
--script
How would you activate all of the scripts in the "vuln" category? -
--script=vuln
Task 4 - Scan Types
Overview
- Read the Scan Types Introduction. -
No answer needed
Task 5 - Scan Types
TCP Connect Scans
Which RFC defines the appropriate behaviour for the TCP protocol? -
RFC 793
If a port is closed, which flag should the server send back to indicate this? -
RST
Task 6 - Scan Types
SYN Scans
There are two other names for a SYN scan, what are they? -
Half-Open, Stealth
Can Nmap use a SYN scan without Sudo permissions (Y/N)? -
N
Task 7 - Scan Types
UDP Scans
If a UDP port doesn't respond to an Nmap scan, what will it be marked as? -
open|filtered
When a UDP port is closed, by convention the target should send back a "port unreachable" message. Which protocol would it use to do so? -
ICMP
Task 8 - Scan Types
NULL,FIN and Xmas
Which of the three shown scan types uses the URG flag? -
xmas
Why are NULL, FIN and Xmas scans generally used? -
Firewall Evasion
Which common OS may respond to a NULL, FIN or Xmas scan with a RST for every port? -
Microsoft Windows
Task 9 - Scan Types
ICMP Network Scanning
- How would you perform a ping sweep on the 172.16.x.x network (Netmask: 255.255.0.0) using Nmap? (CIDR notation) -
nmap -sn 172.16.0.0/16
Task 10 - NSE Scripts
Overview
What language are NSE scripts written in? -
Lua
Which category of scripts would be a very bad idea to run in a production environment? -
intrusive
Task 11 - NSE Scripts
Working with the NSE
- What optional argument can the
ftp-anon.nse
script take? -maxlist
Task 12 - NSE Scripts
Searching for Scripts
Search for "smb" scripts in the
/usr/share/nmap/scripts/
directory using either of the demonstrated methods.- What is the filename of the script which determines the underlying OS of the SMB server? -
smb-os-discovery.nse
- What is the filename of the script which determines the underlying OS of the SMB server? -
Read through this script. What does it depend on? -
smb-brute
Task 13 - Firewall Evasion
Which simple (and frequently relied upon) protocol is often blocked, requiring the use of the -Pn switch? -
ICMP
[Research] Which Nmap switch allows you to append an arbitrary length of random data to the end of packets? -
--data-length
Task 14 - Practical
Does the target respond to ICMP (ping) requests (Y/N)? -
N
Perform an Xmas scan on the first 999 ports of the target -- how many ports are shown to be open or filtered? -
999
There is a reason given for this -- what is it? -
No Response
Perform a TCP SYN scan on the first 5000 ports of the target -- how many ports are shown to be open? -
5
Open Wireshark (see my [Wireshark Room] for instructions) and perform a TCP Connect scan against port 80 on the target, monitoring the results. Make sure you understand what's going on -
No answer needed
Deploy the
ftp-anon
script against the box. Can Nmap login successfully to the FTP server on port 21? (Y/N) -Y
Task 15 - Conclusion
This room has pretty good basic knowledge on how to use nmap
, i hope you learn something new. Time to go on and start hacking!