Network Discovery Detection Tryhackme Answers
Understand how attackers discover assets in a network, and how to detect that activity.
CYBERSECURITYTHREAT DETECTIONTRYHACKME WALKTHROUGHTECHNOLOGYETHICAL HACKINGTRYHACKMESECURITY OPERATIONS (SOC)NETWORKINGNETWORK DISCOVERYDETECTIONTRYHACKME WRITEUPS
10/1/20251 min read


Task 1 : Introduction
Learning Objectives
By the end of this room, we aim to understand:
What is network discovery
Why attackers perform network discovery
What are the different types of network discovery
How network discovery techniques work, and how we can detect them
Task 2 : Network Discovery
What do attackers scan, other than, IP addresses, ports, and OS version, in order to identify vulnerabilities in a network?
Services
Task 3 : External vs Internal Scanning
Which file contains logs that showcase internal scanning activity?
log-session-2.csv
How many log entries are present for the internal IP performing internal scanning activity?
2276
What is the external IP address that is performing external scanning activity?
203.0.113.25
Task 4 : Horizontal vs Vertical Scanning
One of the log files contains evidence of a horizontal scan. Which IP range was scanned? Format X.X.X.X/X
203.0.113.0/24
In the same log file, there is one IP address on which a vertical scan is performed. Which IP address is this?
192.168.230.145
On one of the IP addresses, only a few ports are scanned which host common services. Which are the ports that are scanned on this IP address? Format: port1, port2, port3 in ascending order.
80, 445, 3389
Task 5 : The Mechanics of Scanning
Which source IP performs a ping sweep attack across a whole subnet?
192.168.230.127
The zeek.conn.conn_state value shows the connection state. Using the information provided by this value, identify the type of scan being performed by 203.0.113.25 against 192.168.230.145
TCP SYN Scan
Is there any UDP scanning attempt in the logs? Y/N
N
Task 6 : Conclusion
And that's all for this room. In this room, we have learned:
What is network discovery
The difference between external and internal scanning, and the severity on each.
Port scanning and host scanning, and why each of those is performed.
How different types of scans are performed at a more granular room.
Connect
Secure your future with expert cybersecurity solutions
Support
Quick Links
© 2025. All rights reserved.
contact@jawstarsec.in
