Skip to content
Pluralsight Logo
  • Pluralsight
  • Skills
  • Flow
  • Blog
    • Sign in to

      Sign in to Pluralsight Skills
    • Sign in to

      Sign in to Pluralsight Flow
Logo for Pluralsight Skills
Pluralsight Logo
  • Sign in
  • Menu
  • Sign in to Pluralsight Skills

    Sign in to Skills

  • Sign in to Pluralsight Flow

    Sign in to Flow

  • Pluralsight
  • Skills
  • Flow
  • Blog
  • Why Skills?
    • Ways to upskill
    • Icon for Courses Courses
    • Icon for Skills assessments Skill assessments
    • Icon for Labs Labs
    • Icon for Hands-on learning Hands-on learning
    • Icon for Certification prep Certification prep
    • See our entire course library
    • Skills for
    • Icon for Software development Software development
    • Icon for IT ops IT Ops
    • Icon for Info & cyber security Info & cybersecurity
    • Icon for Cloud computing Cloud computing
    • Icon for Machine learning Machine learning
    • Icon for Data professional Data professional
    • For individuals
    • Top trending paths
    • Microsoft Azure Deployment
      Microsoft Azure
    • Cleaning Data with R
      Cleaning data with R
    • Ruby Language Fundamentals
      Ruby Language Fundamentals
    • AWS Operations
      AWS Operations
    • Core Python
      Core Python
  • View plans
  • For individuals
  • Contact Sales
  • Try for free

Contact Sales

1020 Redirect Link
Thank you!
Our team will be in touch shortly.

Loading form...

If this message remains, it may be due to cookies being disabled or to an ad blocker.

Close button
×
AWS Labs
Labs badge iconLAB

Discover and Enumerate Targets with Nmap

Based on information gathered through passive reconnaissance, you have identified subnets owned by the company you are pen-testing. Using Nmap, you now need to do the following: actively scan for hosts (target enumeration), identify operating systems and open ports (host identification), and enumerate services. To ensure you are testing the firewall configurations and the security team’s detection capability, you will mimic a stealthy attacker attempting to bypass protections without being noticed.

* Our Labs are Available for Enterprise and Professional plans only.
Terms and conditions apply.
Contact sales
Labs - Discover and Enumerate Targets with Nmap

Lab info

Rating (158)
Level
Beginner
Duration
2h 45m
Released
Oct 04, 2022

Lab author

Lab Author: Aaron Rosenmund
Aaron Rosenmund
Aaron M. Rosenmund is a cyber security operations subject matter expert, with a background in federal and business defensive and offensive cyber operations and system automation. Leveraging his administration and automation experience, Aaron actively contributes to multiple open and closed source security operation platform projects and continues to create tools and content to benefit the community. As an educator & cyber security researcher at Pluralsight, he is focused on advancing cyber secur... moreity workforce and technologies for business and national enterprises alike. In support of the Air National Guard, he contributes those skills part time in various initiatives to defend the nation in cyberspace. Certifications: GIAC GCIA, GIAC GCED, CCNA Cyber Operations, Pentest+, CySa+, CASP www.AaronRosenmund.com @arosenmund "ironcat"
  • Table of contents
  • What's a lab?
  • Prerequisites
Challenge

Getting Started in the Lab Environment

Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

Challenge

Discover Live Hosts

The general concept for target enumeration is to take a scope, like a set of subnets or domains, and narrow it down to a target list of only the hosts with services that respond. Then you enumerate those services.

Challenge

Host OS and Open Port Identification

Run Nmap and Snort simultaneously to learn how to identify hosts and their open ports without being detected by standard IDS signatures.

Challenge

Service Enumeration

With open ports enumerated on each host, now you leverage targeted scans to enumerate and identify the services running on each port.

Challenge

Vulnerability Enumeration and Exploitation with NSE

Leverage the Nmap script engine to identify and exploit weaknesses in the previously enumerated services.

Challenge

The Last Challenge

This is the last challenge of this lab, and your last chance to experience the environment before clicking finish lab, ending this small little world that flittered into existence just for you.

Labs - code icon

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Labs - list icon

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Labs - analytic icon

Did you know?

On average, you retain 75% more of your learning if you get time for practice.

Recommended prerequisites

  • The lab, Discover and Enumerate Targets with Nmap, requires an understanding of Nmap use cases, basic functions, and basic command operations. Further, an understanding of reconnaissance, scanning and evasion techniques, as well as enumeration and knowledge of the penetration testing process is essential.

Start learning by doing today

Contact sales

Contact Sales

1020 Redirect Link
Thank you!
Our team will be in touch shortly.

Loading form...

If this message remains, it may be due to cookies being disabled or to an ad blocker.

Close button

Ready to skill up
your entire team?

10
Subscriptions
Need more subscriptions? Contact sales.
Continue to checkout Continue to checkout
Cancel

With your Pluralsight plan, you can:

With your 30-day pilot, you can:

  • Access thousands of videos to develop critical skills
  • Give up to 10 users access to thousands of video courses
  • Practice and apply skills with interactive courses and projects
  • See skills, usage, and trend data for your teams
  • Prepare for certifications with industry-leading practice exams
  • Measure proficiency across skills and roles
  • Align learning to your goals with paths and channels

Ready to skill up
your entire team?

10
Subscriptions
Need more subscriptions? Contact sales.
Continue to checkout
Cancel

With your Pluralsight plan, you can:

With your 30-day pilot, you can:

  • Access thousands of videos to develop critical skills
  • Give up to 10 users access to thousands of video courses
  • Practice and apply skills with interactive courses and projects
  • See skills, usage, and trend data for your teams
  • Prepare for certifications with industry-leading practice exams
  • Measure proficiency across skills and roles
  • Align learning to your goals with paths and channels
  • Support

    • Contact
    • Help Center
    • IP Allowlist
    • Site Map
    • Download Pluralsight
    • Skills Plans
    • Flow Plans
  • Community

    • Guides
    • Teach
    • Partner with Pluralsight
    • Affiliate Partners
    • Pluralsight One
    • Authors
  • Company

    • About Us
    • Careers
    • Newsroom
    • Resources
  • Industries

    • Public Sector
    • Non-Profit

Newsletter

Sign up with your email to join our mailing list.

1041 Redirect Link Form Submitted Successfully!

Loading form...

If this message remains, it may be due to cookies being disabled or to an ad blocker.

  • Facebook Logo Icon
  • Twitter Logo Icon
  • Instagram Logo Icon
  • LinkedIn Logo Icon
  • Youtube Logo Icon
Pluralsight Logo Copyright © 2004 - 2023 Pluralsight LLC. All rights reserved
  • Terms of Use
  • Privacy Notice
  • Modern Slavery Act Transparency Statement