Overview
In this lab, you will be scanning for hosts on a Local Area Network (LAN). Figure 1 shows the lab topology for this lab. You are using a distribution of Linux called Kali, which is primarily used for penetration testing. You will scan the network with Kali. You will use Metasploit and Armitage to exploit a machine with vulnerabilities.
outcomes:
In this lab, you will learn to:
- Use nmap to do a ping scan.
- Use Metasploit and Armitage to exploit vulnerabilities and breach a system.
Key terms and descriptions
nmap
A port scanner which will indicate whether ports are open or closed on a remote system.
port
In computer networking, a port is an endpoint of communication in an operating system associated with an IP address of a host and the protocol type of the communication.
Zenmap
A GUI front end for nmap; will allow you to scan for open ports and services.
TCP
Transmission Control Protocol is a network protocol designed to send and ensure end-to-end delivery of data packets over the Internet.
Metasploit
A framework that contains exploits for various information systems.