TRETC 2024 has ended
Monday, January 15 • 10:15am - 11:00am
Knock-Knock Who's There (Hands-on Network Mapping)

Log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.

In this session, you will understand what nmap commands look like, what different post states mean, and how to read the output of a nmap scan. BRING YOUR LAPTOP to practice running nmap (using the Pitt Cyber Range) to scan a network and identify the operating system and running services on discovered machines. We will look at the output together and identify two vulnerable computers which you will have the opportunity to hack into (ethically) as time allows. Make sure to BRING YOUR LAPTOP to be able to perform the activity hands-on using your browser.

Learning Objectives:
1. Understand nmap commands
2. Understand different port states (open/closed/filtered)
3. Learn how to read the output of a nmap scan

avatar for Ahmed Ibrahim

Ahmed Ibrahim

Teaching Associate Professor, University Of Pittsburgh

Monday January 15, 2024 10:15am - 11:00am EST
AB216 WiFi Code: SFGUEST!

Attendees (6)