Getting ready

In order to complete this activity, you will have to satisfy the following prerequisites on your machine:

  1. You must have Nmap installed.
  2. You must have network access to the hosts on which the scans are to be performed.

In order to install Nmap, you can follow the instructions provided in Chapter 2, Understanding Network Scanning Tools. This will allow you to download a compatible version of Nmap and install all the required plugins. In order to check whether your machine has Nmap installed, open Command Prompt and type Nmap. If Nmap is installed, you will see a screen similar to the following:

If you do not see the preceding screen, retry the same step by moving the Command Prompt control into the folder where Nmap is installed (C:Program FilesNmap). If you do not see the screen after doing this, remove and reinstall Nmap.

To populate the open ports on hosts where the scan is going to be performed, you are required to have network-level access to that host. A simple way to check whether you have access to the host is through ICMP by sending ping packets to the host. But this method only works if ICMP and ping are enabled in that network. In cases where ICMP is disabled, live host detection techniques vary. We will look at this in further sections of this book.

In order to obtain the preceding output, we need to install a virtual machine. In order to run a virtual machine, I would recommend using VMware's 30-day trial version, which can be downloaded and installed from https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html.

For the test system, readers can download Metasploitable (a vulnerable virtual machine by Rapid 7) from https://information.rapid7.com/download-metasploitable-2017.html. Perform the following steps to open Metasploitable. This provides various components such as the operating system, database, and a vulnerable application, which will help us test the recipes in this chapter:

  1. Unzip the downloaded Metasploitable package:

  1. Open the .vmx file using the installed VMware Workstation or VMware Player:

  1. Log in using msfadmin/msfadmin as the username and password:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.51.3