Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Perform the following operations and answer the questions. Record your answers in PDF document and submit. Using what you have learned about scanning...
Perform the following operations and answer the questions. Record your answers in PDF document and submit.
Using what you have learned about scanning and enumeration perform the following operations.
Part I: Goat Machine
You have set up your attack machine and now need something to attack. Unfortunately, you just can't go and start attacking something so we need to set up a goat or victim machine you can attack without any worries. To do this do the following:
The quickest way to get another machine setup is to "clone" your existing virtual machine to create a new one, or manually setup a new one either one will work.
- Startup your goat and attack machine - Make sure the goat machine is in bridged network or nothing will work*
On your goat machine, find out what the ip address is
On Your attack machine Start NMap, In Kali nmap is found under "Kali Linux","Information Gathering","Network Scanners","NMap"
1. Nmap –Pn <goat ip address> - Record your results
Explain what the –Pn switch does
2. Use Nmap’s reference guide http://nmap.org/book/man-briefoptions.html to explain the difference in output between the following these two commands:
Nmap –sT <goat ip address>Nmap –sU <goat ip address>
3. Check open ports verbose run: "nmap -vv <goat machine ipaddress>" - Record your results
4. Service scan run: "nmap -sV <goat machine ipaddress>" - Record your results
- Startup the following processes on your goat HTTP and SSH
Open a terminal session and run the following commands:
service apache2 start
service ssh start
- Perform the follow two scans and report the results : *Note: These scans may take awhile
5. Nmap –sT <goat ip address>
6. Nmap –sU <goat ip address>- Perform the follow two scans and report the results : *Note: These scans may take awhile7. Nmap –PN –sT <goat ip address>8. Nmap –PN –sU <goat ip address>
9. Service scan run: "nmap -sV <goat machine ipaddress>" - Record your results10. Perfrom the following scan and record your results: NMap –O –PN <goat ip address>11. Explain what the –O switch does12. From attack machine start Zenmap, In Kali zenmap is found under "Kali Linux","Information Gathering","Network Scanners","zenmap". Zenmap is a GUI front end for NMap. Run "Intense Scan" to <goat machine ipaddress> and record the "NMap Output"