Using kali vm to scan metasploit 3 machines with multiple tools and | Aggressive Hacking | University of South Florida

 

Here we will be scanning with Metasploit and using 2 scanners and one of your own choice.

Remember scanners are located under auxiliary/scanner

  • TCP Scanner – 10 points
  • use auxiliary/scanner/portscan/tcp
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • UDP Probe – 10 Points
  • use auxiliary/scanner/discovery/udp_probe
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • Scan of your choice – 10 Points
  • Review the scanners and choose at least 1 scanner to scan both of your metasploitable machine with. Remember one is Linux and the other is Microsoft so not all scanners work with both.
  • Capture the returned information – cut and paste and add it to your report

Rubric:

  • Captured returned results from tcp scanner for both machines – 10 Points
  • Captured returned results from udp_probe scanner for both machines – 10 Points
  • Captured returned results from <scan of your choice> for both machines – 10 Points

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>