TryHackMe: RP Nmap — Write-Up

Danish Zia
3 min readApr 14, 2020

--

Figure 1.1

Hi,

This article is about RP Nmap room created DarkStar7471 by on TryHackMe. It is free room and everyone can join it.

Description: Part of the Red Primer series, intro to scanning.

This room is a tutorial for Nmap. Let’s get started,

Deploy the machine from “Deploy” button as shown in figure 1.2 below:

Figure 1.2

Nmap help menu can be accessed by following command and shown in figure 1.3 below:

nmap -h

Figure 1.3

-sS is used for “Syn Scan”

-sU is used for “UDP Scan”

Figure 1.4

-O is used for OS Detection

-sV for service version identification

Figure 1.5

-v and -vv are used for verbosity flag.

-oX is used for output of scan results in XML.

Figure 1.6

-A is used for aggressive scan.

Figure 1.7

-T[0–5] is used to Set timing template.

Figure 1.8

-p is used to scan specific given port or ports.

-p- is used to scan all ports.

Figure 1.9

— script is used for scripts usage in Nmap.

Figure 1.10

For vulnnerability scan we use “vuln script”

nmap <IP_Address> — script vuln

Figure 1.11

-Pn us used to avoid ping to machine.

Figure 1.12

There are 2 ports running below 1000 on the server.

Figure 1.13

All ports are running on TCP.

For service version running on machine:

nmap -sV -p 22 10.10.143.244

Figure 1.14

For aggressive scan on port 80:

nmap -A -p 80 10.10.143.244

Figure 1.15

For finding vulnerability with Nmap on machine we will use vuln script

nmap 10.10.143.244 — script vuln

Figure 1.16

Hurrah! We have completed this RP Nmap Challenge. Thanks for staying till here.

If you like this article, then please support on Patreon. So that I keep writing articles like these.

--

--

Danish Zia
Danish Zia

No responses yet