Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I need help with these questions, please also provide the screenshot of every question. Load zenmap and set the target for your entire NAT network

I need help with these questions, please also provide the screenshot of every question.

Load zenmap and set the target for your entire NAT network (mine was 10.0.2.0/24).

Default is intensive scan. Now press scan and wait patiently for full results.

1. Check out each host seen in the scan. Metasploitable was 10.0.2.7 on my network. I see many open ports on that system. As expected, the metasploitable is a mess with open ports including anonymous ftp, telnet, dns, and www. Explore the tabs in Zenmap. Now run a comprehensive scan against metasploitable. Explore the results. Answer the questions provided below based on your scan results. Get a screen capture for you report. Close zenmap.

2.From the command prompt run the specific nmap command recorded for your first zenmap scan in nmap (from question Q6 below). NSE is the nmap scripting engine. You will see it mentioned during the scan process. Answer the questions provided below based on your scan results. Dont forget to get a screen capture.

3. From the command prompt type nikto. Note the number and variety of options (flags) that are available.

Server: Apache/2.2.8 (Ubuntu) DAV/2

Retrieved x-powered-by header: PHP/5.2.4-2ubuntu5.10

These details about the web server version and PHP version may be useful in planning further hacking activities. Particularly notice the Tuning options. Try nikto -host -Tuning 1 Use the ip address of your metasploit target in this command. Several vulnerabilities may be disclosed. For example, OSVBD-877. Google this vulnerability to learn more. These insights may guide you to further attacks on this system. Try a few more of the Tuning options, especially 2, 4, 6, and 9.

Below is the question been ask for:

Q1) From the zenmap scan table provide the specific nmap command used for this scan.

Q2) How many different scans is nmap capable of performing? Q3) Do the results appear to be different between zenmap and nmap

Q4) What is the role of nikto for a pentester? Q5) Describe one interesting (useful) detail you learned from nikto.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Theory And Application Bio Science And Bio Technology International Conferences DTA And BSBT 2011 Held As Part Of The Future Generation In Computer And Information Science 258

Authors: Tai-hoon Kim ,Hojjat Adeli ,Alfredo Cuzzocrea ,Tughrul Arslan ,Yanchun Zhang ,Jianhua Ma ,Kyo-il Chung ,Siti Mariyam ,Xiaofeng Song

2011th Edition

3642271561, 978-3642271564

More Books

Students also viewed these Databases questions