We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Project
Network Reconnaissance and Port Scanning using nmap
We need to use two VMs for this project: the Kali Linux and the Metasploitable2-Linux.
Finding the IP Address of the Target
For the purpose of this project, we use Metasploitable2-Linux as the target. 1) First, we need to find the host IP address of the target to launch a scanning. You can use the command ifconfig (ipconfig is the windows equivalent). This command allows you to find all the connected interfaces and network cards. Go to the Metasploitable2-Linux VM, and execute the following command ifconfig.
Then using Kali terminal we will scan the target.
Use man nmap to find more information about nmap tool. 2) Perform a basic nmap host discovery scan without port scanning. Normally this would be used to scan an entire subnet (or larger), but for this lab, we are going to target specific IPs of interest.
3) Perform a nmap TCP port scan on the Metasploitable2 VM to detect
active services.
4) Perform a nmap UDP port scan on the Metasploitable2 VM to detect
active services.
5) Perform a nmap OS Detection scan on the Metasploitable2 VM.
6) Perform a nmap version and service scan of the Metasploitable2 VM:
7) Perform a nmap scan against the Metasploitable2 VM using the -A (for
all) option. This is the most time consuming scan (at least for TCP) and the most verbose.
Submit a single pdf file that contains a screenshot for every task. The project is individual.