TryHackMe: RP Nmap — Write-Up
Hi,
This article is about RP Nmap room created DarkStar7471 by on TryHackMe. It is free room and everyone can join it.
Description: Part of the Red Primer series, intro to scanning.
This room is a tutorial for Nmap. Let’s get started,
Deploy the machine from “Deploy” button as shown in figure 1.2 below:
Nmap help menu can be accessed by following command and shown in figure 1.3 below:
nmap -h
-sS is used for “Syn Scan”
-sU is used for “UDP Scan”
-O is used for OS Detection
-sV for service version identification
-v and -vv are used for verbosity flag.
-oX is used for output of scan results in XML.
-A is used for aggressive scan.
-T[0–5] is used to Set timing template.
-p is used to scan specific given port or ports.
-p- is used to scan all ports.
— script is used for scripts usage in Nmap.
For vulnnerability scan we use “vuln script”
nmap <IP_Address> — script vuln
-Pn us used to avoid ping to machine.
There are 2 ports running below 1000 on the server.
All ports are running on TCP.
For service version running on machine:
nmap -sV -p 22 10.10.143.244
For aggressive scan on port 80:
nmap -A -p 80 10.10.143.244
For finding vulnerability with Nmap on machine we will use vuln script
nmap 10.10.143.244 — script vuln
Hurrah! We have completed this RP Nmap Challenge. Thanks for staying till here.
If you like this article, then please support on Patreon. So that I keep writing articles like these.