Lab 5
Lab 5
1) Run a default Nmap scan of the Metasploitable 2 VM? What ports are open?
1604 Lab 5 Fall2019
➔ Along with the common ports which are open such as 21, 22, 23 53, 80 port
no. 8180 which is a TCP port is also open and running an unknown service.
2) Run a full TCP port scan of the Metasploitable 2 VM? What additional ports
were found?
Other ports which are open are 8180, 38692, 41385, 50842, 54117 which are
running unknown services.
3) Run a UDP scan of the Metasploitable 2 VM. What ports were found?
1604 Lab 5 Fall2019
4) Why is it useful to run a scan of all ports instead of just the default?
→ By scanning all ports, we can know which unnecessary services are
running on the ports which can exploit our system.
5) Use the -sV command in your Nmap scan? What useful information was
provided?
1604 Lab 5 Fall2019
Along with the port no., state and service which are running on them -sV
command also reveals the version of the services as we can see in the
screenshot.
6) Using the information gathered above, identify at least 2 services that can be
exploited. List them below.
➔ SMTP service can be exploited by DDOS attack
➔ FTP can be attacked using FTP bounce attack or FTP Brute Force Attack.