root@kali:-# nmap -pl-65535 192.168.1.127 -- open e Starting Nmap 7.60 ( https://nmap.org ) at 2017-11-24 04:45 EST Nmap scan report for 192.168.1.127 Host is up (0.0020s latency). Not shown: 65522...

Introduction to securityroot@kali:-# nmap -pl-65535 192.168.1.127 -- open e<br>Starting Nmap 7.60 ( https://nmap.org ) at 2017-11-24 04:45 EST<br>Nmap scan report for 192.168.1.127<br>Host is up (0.0020s latency).<br>Not shown: 65522 closed ports<br>PORT<br>135/tcp<br>139/tcp<br>443/tcp<br>445/tcp<br>902/tcp<br>912/tcp<br>3389/tcp<br>49152/tcp open<br>49153/tcp open<br>49154/tcp open<br>49155/tcp open<br>49158/tcp open<br>49159/tcp open<br>MAC Address: FC:AA:<br>STATE SERVICE<br>оpen<br>msrpc<br>netbios -ssn<br>open<br>open<br>https<br>microsoft-ds ticles.in<br>iss-realsecure<br>оpen<br>open<br>open<br>open<br>apex-mesh<br>ms -wbt -server<br>unknown<br>unknown<br>unknown<br>unknown<br>unknown<br>unknown<br>E6 (Giga-byte Technology)<br>Nmap done: 1 IP address (1 host up) scanned in 23.07 seconds<br>I d. Explain how nmap tool can be used by both network<br>administrator and hackers.<br>

Extracted text: root@kali:-# nmap -pl-65535 192.168.1.127 -- open e Starting Nmap 7.60 ( https://nmap.org ) at 2017-11-24 04:45 EST Nmap scan report for 192.168.1.127 Host is up (0.0020s latency). Not shown: 65522 closed ports PORT 135/tcp 139/tcp 443/tcp 445/tcp 902/tcp 912/tcp 3389/tcp 49152/tcp open 49153/tcp open 49154/tcp open 49155/tcp open 49158/tcp open 49159/tcp open MAC Address: FC:AA: STATE SERVICE оpen msrpc netbios -ssn open open https microsoft-ds ticles.in iss-realsecure оpen open open open apex-mesh ms -wbt -server unknown unknown unknown unknown unknown unknown E6 (Giga-byte Technology) Nmap done: 1 IP address (1 host up) scanned in 23.07 seconds I d. Explain how nmap tool can be used by both network administrator and hackers.

Jun 05, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here