[Attacks and Exploits]
You are a penetration tester running port scans on a server.
INSTRUCTIONS
Part 1: Given the output, construct the command that was used to generate this output from the available options.
Part 2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Part 1 - 192.168.2.2 -O -sV --top-ports=100 and SMB vulns
Part 2 - Weak SMB file permissions
https://subscription.packtpub.com/book/networking-and-servers/9781786467454/1/ch01lvl1sec13/fingerprinting-os-and-services-running-on-a-target-host
Krystina
2 months agoDesmond
2 months agoCarin
3 months agoYolando
3 months agoFelicitas
3 months agoFernanda
3 months agoZona
4 months agoElroy
4 months agoDiego
4 months agoTrina
4 months agoPaul
4 months agoKayleigh
5 months agoSabrina
5 months ago