1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
11

If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo

uld running the following command be a bad idea?
Computers and Technology
2 answers:
Juliette [100K]3 years ago
8 0

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

Angelina_Jolie [31]3 years ago
5 0

Answer:

The question is incomplete, the complete question is as follows:

"If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why would running the following command be a bad idea? nmap 10.16.0.0/16. Explain your answer"

<em>Running the command would be a bad idea because Nmap 10.16.0.0/16 will search for and list all the subnets for the host 10.16.0.0 which are 256 in number.It will be better to rather use the command -sl 10.16.0.0/16 at first. This feature simply enumerates every IP address in the given target range and does a reverse-DNS lookup (unless -n was specified) on each</em>.

Explanation:

Let us look deeper into meaning of Nmap. Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this is to explain better use of nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.  

It was originally written by Gordon Lyon and it can answer the following questions easily:

i.  What computers did you find running on the local network?

ii. What IP addresses did you find running on the local network?

iii. What is the operating system of your target machine?

iv. Find out what ports are open on the machine that you just scanned?

v.  Find out if the system is infected with malware or virus.

vi. Search for unauthorized servers or network service on your network.

vii. Find and remove computers which don’t meet the organization’s minimum level of security.

Regarding this topic, we will deal with question vi that nmap can answer as above.

Like I said earlier, the best bet is to use the -sl nmap command(Nmap list scan) as it is can easily detect for vulnerability by showing names using DNS listing. The names of the hosts can hint at potential vulnerabilities and allow for a better understanding of the target network, all without raising suspicion by users on the network. Also, this Nmap list scan double-checks that the ip ranges being checked for vulnerabilities are correct for the particular company or network in oorder not to make a mistake by hacking another company's ip unnecessarily.

You might be interested in
Read the scenario and then choose which type of
marysya [2.9K]

Answer:

employee list.

Explanation:

An employee list can be defined as a textual document that comprises of important informations such as names, contact address, gender, religion, next of kin, home address etc., about an employee working in an organization or business firm.

In this scenario, a human-resources director creates a report containing the names and contact information of employees at the company. Thus, this report represents an employee list.

The main purpose of an employee list is to provide a detailed description or information about all of the employees working in an organization at a specific period of time.

5 0
3 years ago
Read 2 more answers
DO YOU EVER FEEL LIKE A PLASTIC<br> DRIFTING THROUGH THE WIND, WANTING TO START AGAIN
Anna35 [415]

Answer:

what exactly is the question because I don't see anything

4 0
3 years ago
Read 2 more answers
Range of motion definition
svet-max [94.6K]
Range of Motion:
Range of Motion or ROM is an exercise machine when a person has been injured in some way, most times the doctor's advises the patients to exercise and stretch the back back muscles. 
<span />
7 0
3 years ago
If you are signed into a Microsoft account and need to sign into another one, click ____ on the list arrow next to Your Name in
torisob [31]

Answer:

left

Explanation:

If you are signed into a Microsoft account and need to sign into another one, click left on the list arrow next to Your Name in the top-right corner of the Word window.

Multiple Microsoft accounts can be opened at one time in different tabs of your computer. They can be used simultaneously as well. It helps the user to work efficiently rather than logging in or logging out from his accounts which hinders effective and efficient output.

5 0
3 years ago
The best way to find out the average salary in your company is to perform a technique, known as Advanced Calibrated Sampling (AC
Setler [38]

Answer:

Agree

Explanation:

The best way to find out the average salary in your company is to perform a technique, known as Advanced Calibrated Sampling (ACS).

7 0
3 years ago
Other questions:
  • Create a function that will concatenate two strings, combining them with a specified separator. To do so, write a function calle
    5·1 answer
  • Can someone explain to me what coom means? kekw
    12·1 answer
  • A collection of methods that can be used by any class, as long as the class provides a definition to override the collection's a
    5·1 answer
  • Write a program that declares constants to represent the number of inches, feet, and yards in a mile. Name the constants INCHES_
    6·1 answer
  • DJ wants to see how his document will look when printed. Where would he find the button to see the document in print view?
    12·2 answers
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • Anyone Free to Talk??????? I'm Bored :(
    6·2 answers
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • The intelligence displayed by humans and other animals is termed?
    15·1 answer
  • If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data se
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!