Netdiscover , Arp -scan , etc .) to identify networks and targets Identify what ports, services, and versions of software are running in the network environment Part B: Additionally , you will need to complete a vulnerability scan against your target host to identify vulnerabilities that you can then use to exploit to gain administrative /root access in the following project section Option 1 - Local Lab Choose any of the tools within your chosen Attack VM (Kali, Parrot OS, etc.) to map your network following the Part A requirements Choose any vulnerability scanning software to download , install and configure (Open VAS, Nessus, etc.) complete Part B. You should be able to find free "personal /home use versions )." Configure a scan to run against your target host . If your target host is a deliberately vulnerable machine you should find plenty of "critical /high " vulnerabilities to choose for your attack in the following project section Option 2 - Remote Lab You may choose to complete this portion of the project using the Infosec Learning Lab "Remote and Local Exploitation." No software downloads are required, so just configure your tools and complete the scans. Follow the requirements in the Project Section 2 Details. Part 3 - Exploitation: Gaining Access through A vulnerability identified during the vuln scan (Week 6) PROJECT SECTION 3 DETAILS: The third part of your project requires you to exploit a vulnerability of your choosing based on the previous section's scanning . The exploit should be through a Metasploit Module or other open - source/commercial tool or custom script /code . Select your vulnerability carefully. You should thoroughly research your vulnerability before you start to exploit it - which is the same process you would use in a professional capacity. The vulnerability MUST RESULT IN GAINING SYSTEM/ROOT ACCESS on the target host . Compromised credentials (including no password or weak password ) is not a sufficient vulnerability to exploit