Nmap: The Basics
My experience with TryHackMe has been an interesting one. Interesting in the sense that I have been learning and implementing things that I did not expect to learn.
For example, I have been diving deep into commands within an Attack Box terminal. Where prompts are provided and I use the commands to answer the prompt. I used Nmap -sn with IP addresses to find live hosts. I used options like -sT to run TCP connect scans and -O for Operating System detection. Learned to distinguish the different types of port scans, detect the versions of running services, control the timing of scans, and format the output of scans.

