Lab4 SE161942
Lab4 SE161942
Lab4 SE161942
Setup
Start your Kali VM and log in as kali with the password kali
Start your Metasploitable 2 VM and log in as msfadmin with the password msfadmin
Execute the ifconfig command on both machines and ping from one to the other. Make sure you
get replies, as shown below.
Task 1: Finding Hosts & Open Ports
In Kali, execute this command to locate all hosts on your network.
Replace the subnet address below with the correct subnet for your machine. Usually all you need
is the first 3 bytes of
the IP address, as highlighted in the image above.
netdiscover -r 192.168.98.0/24
As shown below, the scanner finds all the machines on your network. One of them should be
your Metasploitable 2 machine.
Press Ctrl+C to exit netdiscover.
Execute this command to scan all 65,536 TCP ports on the target, replacing the IP address with
the IP address of your Metasploitable 2 VM.
nmap -sS -p- 192.168.98.134
This scan quickly finds all open ports, as shown below, but it doesn't find versions of the
services.
Execute this command to scan 1000 common ports on the target, with version detection and OS
detection. Replace the IP address with the IP address of your Metasploitable 2 VM.
nmap -sS -sV -O 192.168.98.134
This scan finds many version numbers, as shown below