Page 17 - CPTE_Lab_Guide_Sample
P. 17
Official Student Lab Guide
Lab 4 – Detecting Live Systems
c. Try grep the results (-oG)
i. nmap –p 139 192.168.48.#/22 -oG 139.txt
ii. cat 139.txt
iii. cat 139.txt | grep open | cut -d “ “ -f2
Report piracy if the fingerprint in this box is of poor resolution!
7. You've found several IP addresses with open port 139. You still do not know, however, which
operating systems are present on these IPs. nmap has a wonderful feature called OS
fingerprinting (-O). This feature attempts to guess the underlying operating system by inspecting
the packets received from the machine. As it turns out, each vendor implements the TCP/IP
stack slightly differently (default TTL values, windows size), and these differences create an
almost unique fingerprint:
a. sudo nmap –O 192.168.#.# (Use a system of your choice)
Certified Penetration Testing Engineer – v06.3.1.4 P a g e | 65
©Mile2 – All Rights Reserved