3.2 Manual Vulnerability Assessment Lab Part 1
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
1 hour 27 minutes
to navigate lab, go to www dot cyber dot i t
click. Browse, then click the link first. Either score lobs,
scroll through the labs until you find the manual vulnerability. Assessment. Love.
Hi. And welcome to the manual vulnerability Assessment lab provided by Cyber Score.
First, we're gonna skin the network with an map utility. Go ahead and log in to Cali. Lennox. Username, root, password,
password within and sign. And a zero
once logged in. We're gonna open terminal
going type, and I have config
notice. Looking at the output that the network is private.
Now we're gonna go ahead and type and map 192.168 dot 0.0 Such 24
tea. Quick scan results dot text
This is gonna give us a text output of what we're looking at.
Once you have your output, we can go ahead and open the text file.
You can do this by typing in leaf pad. Quick skin results dot text in an ampersand sign into the terminal.
Once that tux document is open, we can go ahead and look at the skin. Results
noticed the host that were discovered
by looking at the Port ST in service fields,
you should have discovered seven homes.
Go ahead and open a new terminal window.
We're good to go ahead and type and map. Dash B 192.168 dot 0.20
t 192.168 dot 0.20 Underscore skin results. That text
this would create a text file over output for the map.
Go ahead and open the text file that was created by typing leave. Pad 192.168 dot 0.20. Underscores get results that t X t. With an ampersand into the terminal,
you can see the skin results, including the open ports in the art ping. Um,
the cell scan. Other
aspect of the M mob scan report in the text file.
Back in the terminal window, we're gonna go head in tape
and map. Dash a 192.168 dot 0.20 t 192.168 dot 0.20 Underscore the less fingerprint dot text
Once that's done and it can take a little bit, we can go ahead and openness by typing leave. Pad 192.168 dot 0.20. Underscore os fingerprint dot text. Then we can examine the output of the O S fingerprint.
Now that we're done with this, you can stay tuned for part two, where we identify access to the *** server objects.