Page 17 - CPTE_Lab_Guide_Sample
P. 17

Official Student Lab Guide

                                                                                  Lab 4 – Detecting Live Systems









































                          c.  Try grep the results  (-oG)
                                 i.  nmap –p 139 192.168.48.#/22 -oG 139.txt
                               ii.  cat 139.txt
                              iii.  cat 139.txt | grep open | cut -d “ “ -f2

          Report piracy if the fingerprint in this box is of poor resolution!












                   7.  You've found several IP addresses with open port 139. You still do not know, however, which
                       operating systems are present on these IPs. nmap has a wonderful feature called OS
                       fingerprinting (-O). This feature attempts to guess the underlying operating system by inspecting
                       the packets received from the machine. As it turns out, each vendor implements the TCP/IP
                       stack slightly differently (default TTL values, windows size), and these differences create an
                       almost unique fingerprint:
                          a.  sudo nmap –O 192.168.#.# (Use a system of your choice)



               Certified Penetration Testing Engineer – v06.3.1.4                                 P a g e  | 65
               ©Mile2 – All Rights Reserved
   12   13   14   15   16   17   18   19   20   21   22