Page 22 - CPTE_Lab_Guide_Sample
P. 22

Official Student Lab Guide

               Lab 4 – Detecting Live Systems

                              Logs on the host machine will show these ports being opened by the attacker. A TCP
                              connect scan is used with the "-sT" flag as:
                                  i.  nmap -sT 192.168.#.# (try against server 2016)


































                          d.  Stealth scanning: What if an attacker wants to scan a host without being logged on the
                              target machine? TCP SYN scans are less prone to logging on the target's machine,
                              because a full handshake never completes. A SYN scan starts by sending a SYN packet,
                              which is the first packet in TCP negotiation. Any open ports will respond with a
          Report piracy if the fingerprint in this box is of poor resolution!
                              SYN|ACK, as they should. However, the attacker sends an RST instead of an ACK, which
                              terminates the connection. The advantage is that the 3-way handshake never
                              completes, and fewer sites will log this type of probe. Ports that are closed will respond
                              to the initial SYN with an RST, allowing Nmap to determine that the host isn't listening
                              on that port. This command might require root privileges. The "-sS" flag will launch a
                              SYN scan against a host or network.
                                  i.  nmap -sS 192.168.#.# (try against server 2016)



















               P a g e  | 70                                    Certified Penetration Testing Engineer – v06.3.1.4
                                                                                   ©Mile2 – All Rights Reserved
   17   18   19   20   21   22   23   24   25   26   27