Introduction
In this challenge, you'll investigate a potential security breach by scanning for rogue UDP services on a server. The challenge involves setting up a rogue UDP server listening on port 9995, then using Nmap to perform a UDP scan on localhost, specifically targeting ports 9990-10000. The Nmap scan results are saved to ~/project/udp_scan_results.txt
.
The task is to identify and report the open UDP port number within the specified range by printing it to the console. You'll use grep
to parse the Nmap output and awk
or sed
to extract the port number. If no open UDP port is found, you should print "No open UDP port found". The challenge also includes verification steps to ensure the Nmap scan results file exists and contains the expected output.