Scanning the Network on the LAN

CEH Exam Domain:
Domain 2: Analysis/Assessment
Domain 4: Tools/Systems/Programs

CEH Objective Mapping:
Objective 2.2 Information Security Assessment Process
Objective 4.3 Information Security Tools

Overview

In this lab, you will be scanning for hosts on a Local Area Network (LAN). Figure 1 shows the lab topology for this lab. You are using a distribution of Linux called Kali, which is primarily used for penetration testing. You will scan the network with Kali. You will use Metasploit and Armitage to exploit a machine with vulnerabilities.

outcomes:

In this lab, you will learn to:

  1. Use nmap to do a ping scan.
  2. Use Metasploit and Armitage to exploit vulnerabilities and breach a system.

Key terms and descriptions

nmap
A port scanner which will indicate whether ports are open or closed on a remote system.
port
In computer networking, a port is an endpoint of communication in an operating system associated with an IP address of a host and the protocol type of the communication.
Zenmap
A GUI front end for nmap; will allow you to scan for open ports and services.
TCP
Transmission Control Protocol is a network protocol designed to send and ensure end-to-end delivery of data packets over the Internet.
Metasploit
A framework that contains exploits for various information systems.