Page 20 - CPTE_Lab_Guide_Sample
P. 20
Official Student Lab Guide
Lab 4 – Detecting Live Systems
Report piracy if the fingerprint in this box is of poor resolution!
10. Now you know your way around nmap, let’s try a few scans that may be helpful in different
scenarios.
a. Ping sweep: Intruders are able to sweep entire networks by looking for targets with
Nmap. This is usually done with a ping scan by using the "-sP" flag. By default, Nmap will
send an ICMP echo and a TCP ACK to each host it scans. Hosts that respond to either will
be considered by Nmap to be up
i. nmap -sP 192.168.48.#/22
P a g e | 68 Certified Penetration Testing Engineer – v06.3.1.4
©Mile2 – All Rights Reserved