{"id":1325,"date":"2026-01-02T21:38:00","date_gmt":"2026-01-02T21:38:00","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=1325"},"modified":"2026-01-02T18:38:50","modified_gmt":"2026-01-02T18:38:50","slug":"network-discovery-detection","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=1325","title":{"rendered":"Network Discovery Detection"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-8d1154910ee19f03afc779a2e4a47f6c\"><a href=\"https:\/\/tryhackme.com\/room\/networkdiscoverydetection\">https:\/\/tryhackme.com\/room\/networkdiscoverydetection<\/a><br>Created by: tryhackme<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"204\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-074034.png\" alt=\"\" class=\"wp-image-1326\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-074034.png 576w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-074034-300x106.png 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"883\" height=\"231\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075516.png\" alt=\"\" class=\"wp-image-1327\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075516.png 883w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075516-300x78.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075516-768x201.png 768w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"837\" height=\"217\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075542.png\" alt=\"\" class=\"wp-image-1328\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075542.png 837w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075542-300x78.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075542-768x199.png 768w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-4d52db65c8acd9f326195ff5c7d0c6c5\">&#8220;What do attackers scan, other than IP addresses, ports, and OS versions, in order to identify vulnerabilities in a network?&#8221;<br><br>Services<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"645\" height=\"621\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075802.png\" alt=\"\" class=\"wp-image-1329\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075802.png 645w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-075802-300x289.png 300w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-26263d66d7bb798f90e8e147fd65bc11\">I used this command to clean up things a little: <br>head log-session-2.csv | cut -d&#8217;,&#8217;  -f1,2,3,4,5,6,7,8,9,10,11<br><br>&#8220;Which file contains logs that showcase internal scanning activity?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"143\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633-1024x143.png\" alt=\"\" class=\"wp-image-1330\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633-1024x143.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633-300x42.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633-768x107.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633-1536x214.png 1536w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-095633.png 1647w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-390b4f7d255d04278872c7872fc694f7\">&#8220;How many log entries are present for the internal IP performing internal scanning activity?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"105\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100014.png\" alt=\"\" class=\"wp-image-1332\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100014.png 845w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100014-300x37.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100014-768x95.png 768w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-1b87fd5b62c21049055e517b5f856f1a\">&#8220;What is the external IP address that is performing external scanning activity?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"788\" height=\"239\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100151.png\" alt=\"\" class=\"wp-image-1333\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100151.png 788w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100151-300x91.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-100151-768x233.png 768w\" sizes=\"auto, (max-width: 788px) 100vw, 788px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2cc88c9cf154d9fbd6a5e851139e9fc7\">In Task 4, THM breaks down Horizontal and Vertical scanning. Per Echo, &#8220;Horizontal scanning involves probing multiple hosts or IP addresses within a range, usually targeting the same port or service. It aims to identify vulnerabilities across different systems. Vertical scanning, on the other hand, focuses on a single host or IP address but examines multiple ports or services. This method is useful for discovering vulnerabilities in specific systems by exploring all potential entry points.&#8221;<br><br>This command gives us our next few answers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"414\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-104933-1024x414.png\" alt=\"\" class=\"wp-image-1334\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-104933-1024x414.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-104933-300x121.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-104933-768x311.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-104933.png 1167w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-c18e822cdf538b45e40eeba6e021d711\">&#8220;One of the log files contains evidence of a horizontal scan. Which IP range was scanned? Format X.X.X.X\/X&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"90\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105006-1024x90.png\" alt=\"\" class=\"wp-image-1335\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105006-1024x90.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105006-300x27.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105006-768x68.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105006.png 1245w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-11202222f51d283e07c32c8acfb74d4b\">&#8220;In the same log file, there is one IP address on which a vertical scan is performed. Which IP address is this?&#8221;<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"90\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105248-1024x90.png\" alt=\"\" class=\"wp-image-1336\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105248-1024x90.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105248-300x26.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105248-768x67.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105248.png 1255w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-8c87e1cb82165753d7fd0c84c28ffb3c\">&#8220;On one of the IP addresses, only a few ports are scanned which host common services. Which are the ports that are scanned on this IP address? Format: port1, port2, port3 in ascending order.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"109\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105557-1024x109.png\" alt=\"\" class=\"wp-image-1337\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105557-1024x109.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105557-300x32.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105557-768x82.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-105557.png 1266w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-20bc8c2451d7c0e1cefba3384e43165b\">In Task 5, we get to use Elastic! <br><br>You can use various filters with Elastic. I used network.transport: &#8220;tcp&#8221; to locate the TCP scans. We can use this to obtain our next two answers<br><br>&#8220;Which source IP performs a ping sweep attack across a whole subnet?&#8221;<br><br>Source IP: 192.168.230.127<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235-1024x388.png\" alt=\"\" class=\"wp-image-1338\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235-1024x388.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235-300x114.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235-768x291.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235-1536x583.png 1536w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120235.png 1919w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-64d214266c8209724f6b6bd3d00f2c85\">&#8220;The zeek.conn.conn_state value shows the connection state. Using the information provided by this value, identify the type of scan being performed by 203.0.113.25 against 192.168.230.145&#8221;<br><br>TCP SYN SCAN<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-6457d0749036a2eb98fd241a8f4d84fa\">&#8220;Is there any UDP scanning attempt in the logs? Y\/N&#8221; Nope, using network.tranpost: &#8220;udp&#8221; confirms this!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"412\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441-1024x412.png\" alt=\"\" class=\"wp-image-1339\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441-1024x412.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441-300x121.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441-768x309.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441-1536x617.png 1536w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-02-120441.png 1896w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/networkdiscoverydetectionCreated by: tryhackme &#8220;What do attackers scan, other than IP addresses, ports, and OS versions, in order to identify vulnerabilities in a network?&#8221; Services I used this command to clean up things a little: head log-session-2.csv | cut -d&#8217;,&#8217; -f1,2,3,4,5,6,7,8,9,10,11 &#8220;Which file contains logs that showcase internal scanning activity?&#8221; &#8220;How many log entries are present [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1325","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1325"}],"version-history":[{"count":1,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1325\/revisions"}],"predecessor-version":[{"id":1340,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/1325\/revisions\/1340"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}