<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Nmap_Aufgaben_8421</id>
	<title>Nmap Aufgaben 8421 - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Nmap_Aufgaben_8421"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;action=history"/>
	<updated>2026-04-16T22:40:03Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67199&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Szenario 1 – Red Team Reconnaissance */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67199&amp;oldid=prev"/>
		<updated>2026-02-25T11:00:18Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Szenario 1 – Red Team Reconnaissance&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 11:00 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l319&quot; &gt;Zeile 319:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 319:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 2: Ports auf gefundene Hosts&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 2: Ports auf gefundene Hosts&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# Hinweis: &amp;lt;(...) Process Substitution funktioniert nicht mit sudo!&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;# Stattdessen per Pipe oder targets.txt:&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}' | sudo nmap -sS --top-ports 1000 -iL -&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}' | sudo nmap -sS --top-ports 1000 -iL -&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67198:rev-67199 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67198&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Szenario 1 – Red Team Reconnaissance */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67198&amp;oldid=prev"/>
		<updated>2026-02-25T11:00:06Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Szenario 1 – Red Team Reconnaissance&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 11:00 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l319&quot; &gt;Zeile 319:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 319:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 2: Ports auf gefundene Hosts&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 2: Ports auf gefundene Hosts&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;sudo nmap -sS --top-ports 1000 -iL &lt;/del&gt;&amp;lt;(grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}'&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;)&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;# Hinweis: &lt;/ins&gt;&amp;lt;(&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;...) Process Substitution funktioniert nicht mit sudo!&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;# Stattdessen per Pipe oder targets.txt:&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}' &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;| sudo nmap -sS --top-ports 1000 -iL -&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 3: &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Services + Schwachstellen&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;# Schritt 3: &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Ziele in Datei schreiben, dann scannen&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}' &amp;gt; targets.txt&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sV --script vuln -iL targets.txt&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sV --script vuln -iL targets.txt&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67197:rev-67198 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67197&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* HTTP/HTTPS Enumeration (DMZ) */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67197&amp;oldid=prev"/>
		<updated>2026-02-25T06:48:31Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;HTTP/HTTPS Enumeration (DMZ)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 06:48 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l179&quot; &gt;Zeile 179:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 179:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== HTTP/HTTPS Enumeration (DMZ) ===&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=== HTTP/HTTPS Enumeration (DMZ) ===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;'''Achtung:''' Der Wazuh Agent auf www.microsott.de loggt Apache2-Zugriffe. Diese Scans sind in Wazuh/ELK sichtbar!&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67196:rev-67197 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67196&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Phase 3 – Service &amp; Version Detection */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67196&amp;oldid=prev"/>
		<updated>2026-02-25T06:48:11Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Phase 3 – Service &amp;amp; Version Detection&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 06:48 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l141&quot; &gt;Zeile 141:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 141:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sS -sV -p 80,443 10.0.10.X&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sS -sV -p 80,443 10.0.10.X&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;----&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 4 – NSE (Nmap Scripting Engine) ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 4 – NSE (Nmap Scripting Engine) ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67195:rev-67196 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67195&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Phase 2 – Port Scanning Techniken */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67195&amp;oldid=prev"/>
		<updated>2026-02-25T06:48:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Phase 2 – Port Scanning Techniken&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 06:48 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l94&quot; &gt;Zeile 94:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 94:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sS -p 1-1000 10.0.10.0/24&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;sudo nmap -sS -p 1-1000 10.0.10.0/24&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;{{Hinweis|'''Lernziel:''' Unterschied zwischen &amp;lt;code&amp;gt;open&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;closed&amp;lt;/code&amp;gt; und &amp;lt;code&amp;gt;filtered&amp;lt;/code&amp;gt; verstehen. Gefilterte Ports bedeuten aktive Firewall-Regeln (OPNsense).}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;----&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 3 – Service &amp;amp; Version Detection ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 3 – Service &amp;amp; Version Detection ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67194:rev-67195 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67194&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Discovery deaktivieren (wenn ICMP geblockt) */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67194&amp;oldid=prev"/>
		<updated>2026-02-25T06:47:54Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Discovery deaktivieren (wenn ICMP geblockt)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 06:47 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l50&quot; &gt;Zeile 50:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 50:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;nmap -Pn 172.26.54.0/24&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;nmap -Pn 172.26.54.0/24&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;----&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 2 – Port Scanning Techniken ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Phase 2 – Port Scanning Techniken ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67193:rev-67194 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67193&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: /* Phase 1 – Host Discovery (Ping Scans) */</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67193&amp;oldid=prev"/>
		<updated>2026-02-25T06:47:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Phase 1 – Host Discovery (Ping Scans)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;de&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Nächstältere Version&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Version vom 25. Februar 2026, 06:47 Uhr&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l51&quot; &gt;Zeile 51:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Zeile 51:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;lt;/pre&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;{{Hinweis|'''Lernziel:''' Verstehen, warum &amp;lt;code&amp;gt;-Pn&amp;lt;/code&amp;gt; nötig sein kann, wenn eine Firewall ICMP blockiert (OPNsense DMZ-Regeln).}}&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;----&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key my_wiki:diff::1.12:old-67192:rev-67193 --&gt;
&lt;/table&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67192&amp;oldid=prev</id>
		<title>Maximilian.pottgiesser: Die Seite wurde neu angelegt: „= Nmap Praxis – Cybersecurity Training =  == Netzwerkübersicht ==  {| class=&quot;wikitable&quot; ! Segment !! Netz !! Relevante Hosts |- | WAN || 192.168.Y.0/24 || h…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nmap_Aufgaben_8421&amp;diff=67192&amp;oldid=prev"/>
		<updated>2026-02-25T06:47:06Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „= Nmap Praxis – Cybersecurity Training =  == Netzwerkübersicht ==  {| class=&amp;quot;wikitable&amp;quot; ! Segment !! Netz !! Relevante Hosts |- | WAN || 192.168.Y.0/24 || h…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Nmap Praxis – Cybersecurity Training =&lt;br /&gt;
&lt;br /&gt;
== Netzwerkübersicht ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Segment !! Netz !! Relevante Hosts&lt;br /&gt;
|-&lt;br /&gt;
| WAN || 192.168.Y.0/24 || host200, Roadwarrior&lt;br /&gt;
|-&lt;br /&gt;
| DMZ || 10.0.10.0/24 || www.microsott.de (Apache2 + Wazuh Agent), waf.microsott.de&lt;br /&gt;
|-&lt;br /&gt;
| LAN || 172.26.53.0/24 || win11, kali&lt;br /&gt;
|-&lt;br /&gt;
| Server || 172.26.54.0/24 || win2022, sensor, mqtt, aktor, wazuh, elk, ubuntu&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Wichtige Hinweise zur Umgebung:'''&lt;br /&gt;
* Der Kali-Client (172.26.53.0/24) wird als Angreifer-System für alle Scans verwendet.&lt;br /&gt;
* Auf '''www.microsott.de''' läuft ein '''Apache2-Webserver''' mit einem '''Wazuh Agent''', der die Apache2-Logs an den Wazuh-Server weiterleitet.&lt;br /&gt;
* Scans gegen die DMZ werden dadurch in Wazuh '''detektiert und geloggt''' – ideal für Blue Team Übungen.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 1 – Host Discovery (Ping Scans) ==&lt;br /&gt;
&lt;br /&gt;
Ziel: Welche Hosts sind überhaupt erreichbar?&lt;br /&gt;
&lt;br /&gt;
=== ICMP Echo Request (klassischer Ping-Scan) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -sn 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kombinierter Discovery (TCP SYN + UDP + ICMP) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -sn -PE -PS22,80,443 -PU53 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ARP-Scan im eigenen Segment (LAN) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -sn --send-eth 172.26.53.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Alle drei Segmente auf einmal ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -sn 10.0.10.0/24 172.26.53.0/24 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Discovery deaktivieren (wenn ICMP geblockt) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -Pn 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Hinweis|'''Lernziel:''' Verstehen, warum &amp;lt;code&amp;gt;-Pn&amp;lt;/code&amp;gt; nötig sein kann, wenn eine Firewall ICMP blockiert (OPNsense DMZ-Regeln).}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 2 – Port Scanning Techniken ==&lt;br /&gt;
&lt;br /&gt;
=== TCP Connect Scan (kein Root nötig) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap -sT 172.26.54.10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SYN Stealth Scan (Standard, Root erforderlich) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sS 172.26.54.10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== UDP Scan ===&lt;br /&gt;
UDP-Scans sind langsam, aber wichtig für Dienste wie DNS, SNMP und DHCP.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sU --top-ports 20 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Spezifisch auf DNS, SNMP, DHCP&lt;br /&gt;
sudo nmap -sU -p 53,161,162,67,68 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Alle Ports scannen ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -p- 172.26.54.10&lt;br /&gt;
&lt;br /&gt;
# Schneller mit min-rate&lt;br /&gt;
sudo nmap -p- --min-rate 5000 172.26.54.10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Top-Ports und manuelle Port-Auswahl ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
nmap --top-ports 100 172.26.54.0/24&lt;br /&gt;
nmap --top-ports 1000 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Manuelle Port-Auswahl&lt;br /&gt;
nmap -p 22,80,443,3389,8080,8443 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Firewall-Test gegen DMZ ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Zeigt gefilterte Ports deutlich&lt;br /&gt;
sudo nmap -sS -p 1-1000 10.0.10.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Hinweis|'''Lernziel:''' Unterschied zwischen &amp;lt;code&amp;gt;open&amp;lt;/code&amp;gt;, &amp;lt;code&amp;gt;closed&amp;lt;/code&amp;gt; und &amp;lt;code&amp;gt;filtered&amp;lt;/code&amp;gt; verstehen. Gefilterte Ports bedeuten aktive Firewall-Regeln (OPNsense).}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 3 – Service &amp;amp; Version Detection ==&lt;br /&gt;
&lt;br /&gt;
=== Service-Versionen erkennen ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sV 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Intensität erhöhen (0-9, Standard 7)&lt;br /&gt;
sudo nmap -sV --version-intensity 9 172.26.54.10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OS-Erkennung ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -O 172.26.54.10&lt;br /&gt;
sudo nmap -O --osscan-guess 172.26.54.10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kombination aus Service + OS ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sV -O 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Zielgerichtete Scans je Host ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Ports !! Begründung&lt;br /&gt;
|-&lt;br /&gt;
| win2022 || 22, 135, 139, 445, 3389, 5985, 5986 || RDP, SMB, WinRM&lt;br /&gt;
|-&lt;br /&gt;
| wazuh || 1514, 1515, 55000, 9200, 443 || Wazuh Manager + API&lt;br /&gt;
|-&lt;br /&gt;
| elk || 9200, 9300, 5601, 5044 || Elasticsearch, Kibana, Logstash&lt;br /&gt;
|-&lt;br /&gt;
| mqtt || 1883, 8883, 8083, 8084 || MQTT Broker (plain + TLS)&lt;br /&gt;
|-&lt;br /&gt;
| ubuntu || 22, 80, 443, 8080 || SSH, Webdienste&lt;br /&gt;
|-&lt;br /&gt;
| www.microsott.de || 80, 443 || Apache2 (Wazuh Agent aktiv!)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Beispiel: win2022&lt;br /&gt;
sudo nmap -sS -sV -p 22,135,139,445,3389,5985,5986 172.26.54.X&lt;br /&gt;
&lt;br /&gt;
# Beispiel: www.microsott.de (Wazuh Agent loggt mit!)&lt;br /&gt;
sudo nmap -sS -sV -p 80,443 10.0.10.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 4 – NSE (Nmap Scripting Engine) ==&lt;br /&gt;
&lt;br /&gt;
=== Script-Kategorien ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Kategorie !! Beschreibung&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;safe&amp;lt;/code&amp;gt; || Harmlose Informationsabfragen&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;default&amp;lt;/code&amp;gt; || Standard-Scripts (wie &amp;lt;code&amp;gt;-sC&amp;lt;/code&amp;gt;)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;discovery&amp;lt;/code&amp;gt; || Dienst- und Netzwerkerkennung&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;vuln&amp;lt;/code&amp;gt; || Schwachstellen-Checks&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;intrusive&amp;lt;/code&amp;gt; || Aktive Tests, können Systeme beeinflussen&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;brute&amp;lt;/code&amp;gt; || Passwort-Brute-Force&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;exploit&amp;lt;/code&amp;gt; || Exploit-Versuche&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Default Scripts ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sC 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SMB-Enumeration (win2022) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap --script smb-enum-shares,smb-enum-users,smb-os-discovery -p 445 172.26.54.X&lt;br /&gt;
sudo nmap --script smb-vuln* -p 445 172.26.54.X&lt;br /&gt;
&lt;br /&gt;
# EternalBlue (MS17-010) Check&lt;br /&gt;
sudo nmap --script smb-vuln-ms17-010 -p 445 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== HTTP/HTTPS Enumeration (DMZ) ===&lt;br /&gt;
&lt;br /&gt;
'''Achtung:''' Der Wazuh Agent auf www.microsott.de loggt Apache2-Zugriffe. Diese Scans sind in Wazuh/ELK sichtbar!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap --script http-headers,http-title,http-methods -p 80,443 10.0.10.X&lt;br /&gt;
sudo nmap --script http-enum -p 80,443 10.0.10.X&lt;br /&gt;
sudo nmap --script http-robots.txt -p 80 10.0.10.X&lt;br /&gt;
&lt;br /&gt;
# SSL/TLS Informationen&lt;br /&gt;
sudo nmap --script ssl-cert,ssl-enum-ciphers -p 443 10.0.10.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== SSH Enumeration ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap --script ssh-auth-methods,ssh-hostkey -p 22 172.26.54.0/24&lt;br /&gt;
sudo nmap --script ssh2-enum-algos -p 22 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== MQTT-spezifisch ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap --script mqtt-subscribe -p 1883 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Vulnerability Scanning ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Vorsicht: Kann Systeme beeinflussen!&lt;br /&gt;
sudo nmap --script vuln 172.26.54.X&lt;br /&gt;
&lt;br /&gt;
# Gegen Apache2 auf www.microsott.de (Wazuh detektiert dies!)&lt;br /&gt;
sudo nmap --script vuln -p 80,443 10.0.10.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 5 – Firewall &amp;amp; IDS Evasion ==&lt;br /&gt;
&lt;br /&gt;
'''Wichtig:''' Diese Techniken zeigen, wie Angreifer versuchen, Wazuh und den sensor zu umgehen. Ideal für Red/Blue Team Vergleiche.&lt;br /&gt;
&lt;br /&gt;
=== Fragmentierte Pakete ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -f 10.0.10.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Decoy Scan (eigene IP verschleiern) ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -D RND:5 172.26.54.X&lt;br /&gt;
sudo nmap -D 192.168.1.1,192.168.1.2,ME 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Timing-Templates ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Template !! Name !! Verwendung&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T0&amp;lt;/code&amp;gt; || Paranoid || Extrem langsam, maximale IDS-Evasion&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T1&amp;lt;/code&amp;gt; || Sneaky || Langsam&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T2&amp;lt;/code&amp;gt; || Polite || Netzwerkschonend&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T3&amp;lt;/code&amp;gt; || Normal || Standard&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T4&amp;lt;/code&amp;gt; || Aggressive || Schnell&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T5&amp;lt;/code&amp;gt; || Insane || Sehr schnell, sehr laut&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -T0 172.26.54.X   # IDS-Evasion&lt;br /&gt;
sudo nmap -T5 172.26.54.X   # Maximale Geschwindigkeit&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Source Port Manipulation ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap --source-port 53 172.26.54.X&lt;br /&gt;
sudo nmap --source-port 80 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Idle/Zombie Scan ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Wenn ein geeigneter Zombie-Host verfügbar ist&lt;br /&gt;
sudo nmap -sI 172.26.53.X 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Weitere Evasion-Techniken ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Randomisierte Host-Reihenfolge&lt;br /&gt;
sudo nmap --randomize-hosts 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# MTU anpassen&lt;br /&gt;
sudo nmap --mtu 16 172.26.54.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 6 – Output &amp;amp; Reporting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Normal Output&lt;br /&gt;
nmap -oN scan_results.txt 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# XML Output (für Metasploit importierbar)&lt;br /&gt;
nmap -oX scan_results.xml 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Grepbares Format&lt;br /&gt;
nmap -oG scan_results.gnmap 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Alle Formate gleichzeitig&lt;br /&gt;
sudo nmap -sS -sV -sC -oA full_scan 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Nur offene Ports filtern&lt;br /&gt;
grep &amp;quot;open&amp;quot; scan_results.gnmap&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Phase 7 – Aggressive Kombinations-Scans ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Aggressiver Scan (-A = OS + Version + Scripts + Traceroute)&lt;br /&gt;
sudo nmap -A 172.26.54.0/24&lt;br /&gt;
&lt;br /&gt;
# Vollständiger Audit-Scan&lt;br /&gt;
sudo nmap -sS -sU -sV -sC -O -p- --min-rate 1000 -oA full_audit 172.26.54.X&lt;br /&gt;
&lt;br /&gt;
# Schneller Netzwerk-Überblick&lt;br /&gt;
sudo nmap -sS -sV --top-ports 100 -T4 -oA quick_scan 172.26.54.0/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Übungsszenarien ==&lt;br /&gt;
&lt;br /&gt;
=== Szenario 1 – Red Team Reconnaissance ===&lt;br /&gt;
&lt;br /&gt;
Ziel: Möglichst unauffällig das Netzwerk erkunden.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Schritt 1: Stilles Discovery&lt;br /&gt;
sudo nmap -sn -T2 172.26.54.0/24 -oG hosts_up.gnmap&lt;br /&gt;
&lt;br /&gt;
# Schritt 2: Ports auf gefundene Hosts&lt;br /&gt;
sudo nmap -sS --top-ports 1000 -iL &amp;lt;(grep &amp;quot;Up&amp;quot; hosts_up.gnmap | awk '{print $2}')&lt;br /&gt;
&lt;br /&gt;
# Schritt 3: Services + Schwachstellen&lt;br /&gt;
sudo nmap -sV --script vuln -iL targets.txt&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Szenario 2 – Blue Team Detection Test ===&lt;br /&gt;
&lt;br /&gt;
Ziel: Prüfen, ob Wazuh und ELK den Scan detektieren.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Lauten Scan gegen www.microsott.de durchführen&lt;br /&gt;
sudo nmap -A -T4 10.0.10.X&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Danach in Wazuh und ELK prüfen:&lt;br /&gt;
* Wurden Alerts für den Apache2-Zugriff generiert?&lt;br /&gt;
* Welche Rule IDs hat Wazuh ausgelöst?&lt;br /&gt;
* Hat der '''sensor''' im Server-Netz den Scan-Traffic erfasst?&lt;br /&gt;
* Ist der Scan im ELK-Dashboard sichtbar?&lt;br /&gt;
&lt;br /&gt;
=== Szenario 3 – WAF-Test in der DMZ ===&lt;br /&gt;
&lt;br /&gt;
Ziel: Den Unterschied zwischen www.microsott.de (ohne WAF) und waf.microsott.de (mit WAF) sichtbar machen.&lt;br /&gt;
&lt;br /&gt;
Wichtig: Die WAF leitet HTTP auf HTTPS um (301), daher curl mit &amp;lt;code&amp;gt;-sk&amp;lt;/code&amp;gt; verwenden.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
echo &amp;quot;=== OHNE WAF – www.microsott.de (10.0.10.108) ===&amp;quot;&lt;br /&gt;
curl -s -o /dev/null -w &amp;quot;Normal:         %{http_code}\n&amp;quot; &amp;quot;http://10.0.10.108/&amp;quot;&lt;br /&gt;
curl -s -o /dev/null -w &amp;quot;SQLi:           %{http_code}\n&amp;quot; &amp;quot;http://10.0.10.108/?id=1' OR '1'='1&amp;quot;&lt;br /&gt;
curl -s -o /dev/null -w &amp;quot;XSS:            %{http_code}\n&amp;quot; &amp;quot;http://10.0.10.108/?q=&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;quot;&lt;br /&gt;
curl -s -o /dev/null -w &amp;quot;Path Traversal: %{http_code}\n&amp;quot; &amp;quot;http://10.0.10.108/../../../etc/passwd&amp;quot;&lt;br /&gt;
&lt;br /&gt;
echo &amp;quot;&amp;quot;&lt;br /&gt;
echo &amp;quot;=== MIT WAF – waf.microsott.de (10.0.10.110) ===&amp;quot;&lt;br /&gt;
curl -sk -o /dev/null -w &amp;quot;Normal:         %{http_code}\n&amp;quot; &amp;quot;https://10.0.10.110/&amp;quot;&lt;br /&gt;
curl -sk -o /dev/null -w &amp;quot;SQLi:           %{http_code}\n&amp;quot; &amp;quot;https://10.0.10.110/?id=1' OR '1'='1&amp;quot;&lt;br /&gt;
curl -sk -o /dev/null -w &amp;quot;XSS:            %{http_code}\n&amp;quot; &amp;quot;https://10.0.10.110/?q=&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;&amp;quot;&lt;br /&gt;
curl -sk -o /dev/null -w &amp;quot;Path Traversal: %{http_code}\n&amp;quot; &amp;quot;https://10.0.10.110/../../../etc/passwd&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Erwartetes Ergebnis:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
=== OHNE WAF – www.microsott.de (10.0.10.108) ===&lt;br /&gt;
Normal:         200&lt;br /&gt;
SQLi:           200   ← kein Schutz&lt;br /&gt;
XSS:            200   ← kein Schutz&lt;br /&gt;
Path Traversal: 200   ← kein Schutz&lt;br /&gt;
&lt;br /&gt;
=== MIT WAF – waf.microsott.de (10.0.10.110) ===&lt;br /&gt;
Normal:         200&lt;br /&gt;
SQLi:           403   ← geblockt!&lt;br /&gt;
XSS:            403   ← geblockt!&lt;br /&gt;
Path Traversal: 403   ← geblockt!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Szenario 4 – Wazuh/Apache2 Log-Analyse ===&lt;br /&gt;
&lt;br /&gt;
Ziel: Den Zusammenhang zwischen HTTP-Zugriff und Wazuh-Alert verstehen.&lt;br /&gt;
&lt;br /&gt;
# Scan gegen www.microsott.de durchführen (Apache2 + Wazuh Agent):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sudo nmap -sS -sV -p 80,443 10.0.10.108&lt;br /&gt;
sudo nmap --script http-headers,http-title,http-enum -p 80 10.0.10.108&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Überprüfe danach auf dem Wazuh-Server die Alerts:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Auf dem Wazuh-Manager (172.26.54.X):&lt;br /&gt;
tail -f /var/ossec/logs/alerts/alerts.log | grep -i &amp;quot;apache\|web\|http&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# Oder im ELK-Dashboard (Kibana) nach dem Index &amp;lt;code&amp;gt;wazuh-alerts-*&amp;lt;/code&amp;gt; filtern.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Cheat Sheet – Wichtigste Flags ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Flag !! Bedeutung&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-sS&amp;lt;/code&amp;gt; || SYN Stealth Scan&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-sT&amp;lt;/code&amp;gt; || TCP Connect Scan&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-sU&amp;lt;/code&amp;gt; || UDP Scan&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-sV&amp;lt;/code&amp;gt; || Version Detection&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-sC&amp;lt;/code&amp;gt; || Default Scripts (wie --script=default)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-O&amp;lt;/code&amp;gt; || OS Detection&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-A&amp;lt;/code&amp;gt; || Alles (OS + Version + Scripts + Traceroute)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-p-&amp;lt;/code&amp;gt; || Alle 65535 Ports&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-Pn&amp;lt;/code&amp;gt; || Host-Discovery überspringen&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-T0&amp;lt;/code&amp;gt; – &amp;lt;code&amp;gt;-T5&amp;lt;/code&amp;gt; || Timing (langsam → schnell)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-oA&amp;lt;/code&amp;gt; || Output in alle Formate (Normal, XML, Grepbar)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;--script&amp;lt;/code&amp;gt; || NSE Script(s) laden&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-f&amp;lt;/code&amp;gt; || Fragmentierte Pakete (Evasion)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-D&amp;lt;/code&amp;gt; || Decoy-Scan (IP verschleiern)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;--source-port&amp;lt;/code&amp;gt; || Quellport manuell setzen&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;--min-rate&amp;lt;/code&amp;gt; || Mindest-Paketrate (z.B. --min-rate 5000)&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;code&amp;gt;-iL&amp;lt;/code&amp;gt; || Ziele aus Datei einlesen&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Weiterführende Quellen ==&lt;br /&gt;
&lt;br /&gt;
* [https://nmap.org/book/man.html Nmap Reference Guide (offiziell)]&lt;br /&gt;
* [https://nmap.org/nsedoc/ NSE Script-Dokumentation]&lt;br /&gt;
* [https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/rules.html&lt;/div&gt;</summary>
		<author><name>Maximilian.pottgiesser</name></author>
	</entry>
</feed>