Nmap Practical— TryHackMe Walkthrough

Katjah Smith👩🏽‍💻
3 min readFeb 9, 2022

--

Hey hackers! This blog will provide answers and explanations for the TryHackMe Nmap Practical.

  1. Does the target (MACHINE_IP)respond to ICMP (ping) requests (Y/N)?

Answer: N

Explanation: The machine IP didn’t respond to the ping request as when the IP was pinged it responded with ‘100% packet loss.

2. Perform a Xmas scan on the first 999 ports of the target — how many ports are shown to be open or filtered?

Answer: 999

Explanation: The scan type Xmas is represented with ‘-sX’, the first 999 ports were specified with ‘-p999’ and the machine IP xx.xx.xxx.xxx to get the answer. The answer can be seen under the PORT/ STATE.

3. There is a reason given for this — what is it?

Note: The answer will be in your scan results. Think carefully about which switches to use — and read the hint before asking for help!

Answer: no response

Explanation: The question wanted to know why 999 ports were filtered/open and the results of the command showed the ‘REASON’ was no-response

4. Perform a TCP SYN scan on the first 5000 ports of the target — how many ports are shown to be open?

Answer: 5

Explanation: Under the PORT Column a total of 5 ports were seen and their state was OPEN.

6. Deploy the ftp-anon script against the box. Can Nmap login successfully to the FTP server on port 21? (Y/N)

Answer: Y

Explanation: It can be observed that under PORT STATE SERVICE columns the script ftp-anon allows Anonymous FTP login (FTP code 230).

Thanks again for reading my blog. Hope it was insightful and aided someone in their TryHackMe journey. Stay tuned for more cybersecurity content and show love by clapping and following me!!!

--

--

Katjah Smith👩🏽‍💻

I'm here to write about my experiences and all that I am learning while exploring the fascinating world of tech and cybersecurity. Follow my blog.