SYSTEMS PENETRATION TESTING
TM359-24B
TMA 02
,EXPERIENCE 1 - LIBRARY
CHALLENGE 1
QUESTION AND ANSWER
Figure 1 Library - Challenge 1 Question and Answer
EVIDENCE
Figure 2 Library - Challenge 1 Evidence
Page | 1
,TECHNICAL EXPLANATION
Command: nmap -A -p- 10.10.1.112
Here -A indicates aggressive to obtain extra information, including OS
detection and valuable information about the host including services
(geekforgeeks, 2024). -p- command is utilised to scan all 65532 ports of
the target network, this provides the penetration tester valuable insight
that can be used later (Nmap.com, n.d)
Page | 2
, CHALLENGE 2
QUESTION AND ANSWER
Figure 3 Library - Challenge 2 Question and Answer
EVIDENCE
Figure 4 Library - Challenge 2 Evidence
Page | 3
TM359-24B
TMA 02
,EXPERIENCE 1 - LIBRARY
CHALLENGE 1
QUESTION AND ANSWER
Figure 1 Library - Challenge 1 Question and Answer
EVIDENCE
Figure 2 Library - Challenge 1 Evidence
Page | 1
,TECHNICAL EXPLANATION
Command: nmap -A -p- 10.10.1.112
Here -A indicates aggressive to obtain extra information, including OS
detection and valuable information about the host including services
(geekforgeeks, 2024). -p- command is utilised to scan all 65532 ports of
the target network, this provides the penetration tester valuable insight
that can be used later (Nmap.com, n.d)
Page | 2
, CHALLENGE 2
QUESTION AND ANSWER
Figure 3 Library - Challenge 2 Question and Answer
EVIDENCE
Figure 4 Library - Challenge 2 Evidence
Page | 3