Part 2 - Scanning Metasploitable

Video Activity

This lesson offers instructions in how to scan metasploitable. Participants learn how to set up a new project and then scan it for anything metasploitable; which is done using the IP address. This produces a simple NMAP scan within metasploit which offers a start in coming up with potential items that need further investigation.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
5 hours 38 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Description

This lesson offers instructions in how to scan metasploitable. Participants learn how to set up a new project and then scan it for anything metasploitable; which is done using the IP address. This produces a simple NMAP scan within metasploit which offers a start in coming up with potential items that need further investigation.

Video Transcription
00:04
Okay, so the update finally finished.
00:07
Go back to my project list.
00:11
I don't have any projects created. Other the default one at this point. So I'm gonna go click new project,
00:18
and I'm gonna skin while we're gonna create project for men. Explainable.
00:27
And there it is.
00:29
And I already know
00:32
the I p address. So I'm just gonna go ahead and put that in.
00:37
Oops.
00:47
And when I can do from this point, I could do a simple scan from within Mass played itself.
00:56
This is basically just doing an end maps. Can it support scan? It's not gonna be very detailed,
01:02
but it's a start in enumerating service is for this system and
01:08
coming up with
01:11
some potential things to investigate further
01:15
scan shouldn't take too long
01:19
to complete.
Up Next