Nmap/Short Course/Lab 8
From charlesreid1
Main page: Nmap/Short Course
Lecture: Nmap/Short Course/Lecture 8
Summary and Objective
Simulate initial access to one machine in the ICS network (Scenario 2). Students then use Nmap (perhaps with adjusted timing for stealth) from this "compromised" point to map out deeper segments of the ICS network, identifying sensitive control systems.
Flags