Lab3 Instruction
Lab3 Instruction
Introduction
The key to successfully exploit or intrude a remote system is about the information you
have. The first step for penetration is the scanning and reconnaissance. In this lab, you
will learn how to use tools to scan and retrieve information from a targeting system. You
will be using nmap and OpenVAS to scan a vulnerable machine and identify exploits
that can be used to attack it. We will use two Linux virtual machines: One is a Kali Linux
with nmap and OpenVAS installed; and the other one is intentionally vulnerable Linux.
We will use the nmap and OpenVAS on Kali Linux to scan the vulnerable Linux
machine.
Software Requirements
- The VMWare Software
• https://www.vmware.com/
We need to use two VMs for this lab: the Kali Linux and the Metasploitable2-Linux.
First, select the Kali Linux and press Start up
Login the Kali Linux with username root, and password [TBA in the class]. Below is the
screen snapshot after login.
If you see the window below, just click OK. This is due to running two VM at the same
time.
After you log into the VM, you will see the screen below.
For the purpose of this lab, it uses Metasploitable2-Linux as the attacking target. First,
we need to find the host IP address of the target to launch a scanning. You can use the
command “ifconfig” (ipconfig is the windows equivalent). This command allows you to
find all the connected interfaces and network cards.
Go to the Metasploitable2-Linux VM, and execute the following command
$ ifconfig
nmap ("Network Mapper") is an open source tool for network exploration and security
auditing. Though it was designed to rapidly scan large networks, we use it for scanning
the target host in this lab.
Go to the Kali Linux, and open the browser, Iceweasel, by clicking the icon
1. Read the lab instructions above and finish all the tasks.
2. Use nmap to scan the target and find the software version of the OS and the
running services (list at least 3 of the running services). What are the differences
if we use T1, T2, T3 flags? How to avoid detection from an intrusion detection
system (e.g., stealthy scanning)?
3. Use OpenVAS to find two vulnerabilities of the target, and briefly describe them.
Happy Scanning!