What is a Non-Certified Unethical Hacker?I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete some challenges (This challenge comes in some high-profile certifications that I am not going to name.) So, I accepted his challenge. He enrolled for a certification and gave his account to me and told me to complete the challenges. I will take you through the challenges and explain to you what is going on. I hope I will be able to complete 1 challenge per day and prove him wrong, and prove that knowledge is more important than “paper certifications”.About Challenge 2:In this challenge, I am going to use NMAP because most of you guys commented that NMAP is more useful and i should use that. we are going to find operating systems , open ports and services running , etc on the system. In further challenges , we are also going to learn Metasploit and other things. I have tutorials on how to create your own hacking tools using python.Here's Challenge 1 if you missed it.[insert_vertical_space the_pixels="10"][toggle_content title="Additional Materials & Information:"]Social:Youtube : www.youtube.com/priyankgadaFacebook : www.facebook.com/webmaster.pgWebsite : www.priyankgada.com[/toggle_content]