0% found this document useful (0 votes)
27 views1 page

CS443 Project

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views1 page

CS443 Project

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Project

Network Reconnaissance and Port Scanning using nmap


We need to use two VMs for this project: the Kali Linux and the
Metasploitable2-Linux.

Finding the IP Address of the Target


For the purpose of this project, we use Metasploitable2-Linux as the target.
1) First, we need to find the host IP address of the target to launch a scanning.
You can use the command ifconfig (ipconfig is the windows equivalent). This
command allows you to find all the connected interfaces and network cards.
Go to the Metasploitable2-Linux VM, and execute the following command
ifconfig.

Then using Kali terminal we will scan the target.


Use man nmap to find more information about nmap tool.
2) Perform a basic nmap host discovery scan without port scanning.
Normally this would be used to scan an entire subnet (or larger), but for this
lab, we are going to target specific IPs of interest.

3) Perform a nmap TCP port scan on the Metasploitable2 VM to detect


active services.

4) Perform a nmap UDP port scan on the Metasploitable2 VM to detect


active services.

5) Perform a nmap OS Detection scan on the Metasploitable2 VM.

6) Perform a nmap version and service scan of the Metasploitable2 VM:

7) Perform a nmap scan against the Metasploitable2 VM using the -A (for


all) option. This is the most time consuming scan (at least for TCP) and the
most verbose.

Submit a single pdf file that contains a screenshot for every task.
The project is individual.

You might also like