In: Computer Science
1. Generate a nmap command with the following options:
- Polite Scan
- Store the results in a grep-able format (use the name: targets)
- The 25 top ports
- Do not ping the scanned targets
- Target network: 192.168.10.0/24
2. The tool which allows you to script up nmap scans such as vulnerability scans, network discovery, exploitation, etc. is called the ____ ____ ____ (NSE).