Page 20 - CPTE_Lab_Guide_Sample
P. 20

Official Student Lab Guide

               Lab 4 – Detecting Live Systems


















































          Report piracy if the fingerprint in this box is of poor resolution!












                   10. Now you know your way around nmap, let’s try a few scans that may be helpful in different
                       scenarios.
                          a.  Ping sweep: Intruders are able to sweep entire networks by looking for targets with
                              Nmap. This is usually done with a ping scan by using the "-sP" flag. By default, Nmap will
                              send an ICMP echo and a TCP ACK to each host it scans. Hosts that respond to either will
                              be considered by Nmap to be up
                                 i.  nmap -sP 192.168.48.#/22




               P a g e  | 68                                    Certified Penetration Testing Engineer – v06.3.1.4
                                                                                   ©Mile2 – All Rights Reserved
   15   16   17   18   19   20   21   22   23   24   25