Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I need help with these questions, please also provide the screenshot of every question. Load zenmap and set the target for your entire NAT network

I need help with these questions, please also provide the screenshot of every question.

Load zenmap and set the target for your entire NAT network (mine was 10.0.2.0/24).

Default is intensive scan. Now press scan and wait patiently for full results.

1. Check out each host seen in the scan. Metasploitable was 10.0.2.7 on my network. I see many open ports on that system. As expected, the metasploitable is a mess with open ports including anonymous ftp, telnet, dns, and www. Explore the tabs in Zenmap. Now run a comprehensive scan against metasploitable. Explore the results. Answer the questions provided below based on your scan results. Get a screen capture for you report. Close zenmap.

2.From the command prompt run the specific nmap command recorded for your first zenmap scan in nmap (from question Q6 below). NSE is the nmap scripting engine. You will see it mentioned during the scan process. Answer the questions provided below based on your scan results. Dont forget to get a screen capture.

3. From the command prompt type nikto. Note the number and variety of options (flags) that are available.

Server: Apache/2.2.8 (Ubuntu) DAV/2

Retrieved x-powered-by header: PHP/5.2.4-2ubuntu5.10

These details about the web server version and PHP version may be useful in planning further hacking activities. Particularly notice the Tuning options. Try nikto -host -Tuning 1 Use the ip address of your metasploit target in this command. Several vulnerabilities may be disclosed. For example, OSVBD-877. Google this vulnerability to learn more. These insights may guide you to further attacks on this system. Try a few more of the Tuning options, especially 2, 4, 6, and 9.

Below is the question been ask for:

Q1)How many active IP addresses did your initial zenmap scan reveal?

Q2) What OS does zen show for metasploitable? Q3) Which databases are running on metasploitable? Q4) What domain is this host a part of? Q5) List any interesting port/services from your first scan of metasploitable.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

2. What are the different types of networks?

Answered: 1 week ago