Emil uses nmap to scan two hosts using this command.
nmap -sS -T4 -O 192.168.99.1 192.168.99.7
He receives this output:
Nmap scan report for 192.168.99.1
Host is up
(0.00082s latency).
Not shown: 994 filtered ports
PORT
STATE
SERVICE
21/tcp
open
ftp
23/tcp
open
telnet
53/tcp
open
domain
80/tcp
open
http
161/tcp
closed
snmp
MAC Address: B0:75:D5:33:57:74 (ZTE)
Device type: general purpose
Running:
Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.9 – 2.6.33
Network Distance: 1 hop
Nmap scan report for 192.168.99.7
Host is up (0.000047s latency).
All 1000 scanned ports on 192.168.99.7 are closed
Too many fingerprints match thi
s host to give specific OS details
Network Distance: 0 hops
What is his conclusion?
A. Host 192.168.99.7 is an iPad.
B. He performed a SYN scan and OS scan on hosts 192.168.99.1 and 192.168.99.7.
C. Host 192.168.99.1 is the host that he launched the scan
from.
D. Host 192.168.99.7 is down.