From charlesreid1

Main page: Nmap/Short Course

Lecture: Nmap/Short Course/Lecture 8

Summary and Objective

Simulate initial access to one machine in the ICS network (Scenario 2). Students then use Nmap (perhaps with adjusted timing for stealth) from this "compromised" point to map out deeper segments of the ICS network, identifying sensitive control systems.

Flags