Lab Setup And Enumeration

Lab Setup And Enumeration

Setup-

- Metasploitable2(Vulnerable machine for practices) download this from the web and run it in the virtual machine.

- Run on NAT network.

- Password and Username both are msfadmin.

NMAP-

- Nmap(Network mapper) an open-source utility for network discovery for checking open ports and their versions.

- We will use Kali as an attacker machine; the victim is metasploitable2.

- Zenmap is a graphical version of the Nmap.

- The -sn options will do ping scan(disable port scanning) will help to know which ip is open

- for scanning all the subnets we can use 0.0.0.0/24

- To check which operating system is running we have to use -O.

- To check what version a service uses, you can scan -sV. (If the version is old you can check for the vulnerabilities.)

- For changing the speed (-T1-T5) you can use -T5 for highest speed.(It is noisy means it generates more traffic and can be captured by the firewall and we can be blocked.)

- For doing scripting attacks you can use -sC.

- For getting extra information about scan and command you can use -v.

- Nmap default scans till 1000 port.

- For scanning ports you can use -p23(only 23rd port will be scanned) and for scanning all the ports(-P-).

- Majorly there are three states-

- open

- filtered (unable to decide if a port is open or close.)

- closed

-

- For scanning all the options at one time like script result version and others you can use -A (Aggressive.)

- For saving the output we can save with -o(output).

Zenmap-

- It is a graphical version of the Nmap.

- You can install it after seeing the tutorial on the website.

- We can scan with zenmap like the nmap it is just the graphical tool used by people who don't love the text-based tools.

- You can see the other scans also from the history.

- Other tags are the same as the nmap.

- All the features of Nmap is present in the zenmap.

Nikto-

- Used for the web application enumeration.

- It will find the hidden directories.

- For checking the help section do nikto -h.

The basic purpose is to scan for hidden things.


To view or add a comment, sign in

More articles by Ajay Kumar

  • Exploiting Services

    Exploiting FTP - Runs on the port number 21. - We will test it on the metasploitable.

  • Wireless Attacks | Crack wifis

    There are many tools in Kali Linux and ways through which wifi can be hacked. Those attacks are:- - Bruteforcing Method.

  • MITM Attacks & Malware

    What is Malware -> Any malicious program or software which is designed to disrupt services and cause damage and so on…

  • Web Attacks | Cybersecurity | Day 8

    OS Command injection -> It is a vulnerability that is very critical. -> If a user is able to inject operating system…

  • Cybersecurity | Web Attacks | Day 7

    Methodology and web attacks Five Phases of Hacking- 1. Reconnaissance 2.

    1 Comment
  • CyberSecurity | OWASP | Day 6

    What is owasp? -> Owasp is a open web application security project. -> It is non-profit organization.

  • Cybersecurity | Beginner Tools | Day 5

    Create Custom Wordlist - WHY TO CREATE WORDLISTS? -> Wordlists could be very helpful for doing brute force attacks and…

  • Cybersecurity | Beginner to Pro | Day 4

    Touch on Languages BASICS OF HTML <!Doctype html> -> It tells it is html 5 document <html> -> Specifies that from here…

    1 Comment
  • Cybersecurity | Beginner to Pro | Day 3

    NETWORKING IP ADDRESS - It is a unique identifier for a device in the network. - It has two versions IPV4 AND IPV6.

    2 Comments
  • Cybersecurity |Beginner to Pro | Day 2

    Familiarizing with Linux NAVIGATING THROUGH THE Terminal What is a terminal? -> All the work which we can do…

    6 Comments

Explore content categories