From charlesreid1

Main page: Nmap/Short Course

Lecture: Nmap/Short Course/Lecture 10

Summary and Objective

In the Corporate Network (Scenario 1), students use Nmap and NSE to check for policy violations (e.g., services running on non-standard ports, weak ciphers on an internal web app). Attempt to identify a "rogue" device planted in the network.

Flags