header bg

Scan QR code or get instant email to install app


Which of the following Nmap commands helped Jim retrieve the required information? Jim, a professional hacker, attacked a company that manages crucial industrial infrastructure. Jim used Nmap to scan open ports and services operating on servers linked to the organization's OT network. He utilized the Nmap command to locate Ethernet/IP devices connected to the Internet and obtained further information such as the vendor name, product code and name, device name, and IP address.

A nmap -Pn -sU -p 44818 --script enip-info < Target IP >

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *