ペネトレーション テスターは特定の種類のサービスを検索し、以下の出力を取得します。 I Target is synchronized with 127.127.38.0 (reference clock) I Alternative Target Interfaces: I 10.17.4.20 I Private Servers (0) I Public Servers (0) I Private Peers (0) I Public Peers (0) I Private Clients (2) I 10.20.8.69 169.254.138.63 I Public Clients (597) I 4.79.17.248 68.70.72.194 74.247.37.194 99.190.119.152 I 12.10.160.20 68.80.36.133 75.1.39.42 108.7.58.118 I 68.56.205.98 I 2001:1400:0:0:0:0:0:1 2001:16d8:ddOO:38:0:0:0:2 I 2002:db5a:bccd:l:21d:e0ff:feb7:b96f 2002:b6ef:81c4:0:0:1145:59c5:3682 I Other Associations (1) |_ 127.0.0.1 は 1949869 回確認され、最後の TX はユニキャスト v2 モード 7 でした テスターが実行したのは次のコマンドのうちどれですか?
正解:B
The output provided indicates the use of the NTP protocol (Network Time Protocol) for querying a target system. The reference to "Public Clients" and the specific IP addresses listed, along with the mention of "Other Associations" and the use of NTP version 2, points towards the execution of an NTP monlist request. The monlist feature in NTP servers can be used to obtain a list of the last 600 hosts that have interacted with the NTP server. The command nmap -sU -pU:123 -Pn -n -script=ntp-monlist <target> specifically targets NTP servers on UDP port 123 to retrieve this information, making it the correct choice based on the output shown.