Class 2 Lab 3 ‐ Zenmap Network Scanning - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki

Task 1: Environment Configuration

Step 1

  • Open the Kali and Metasploitable machines.

Step 2

  • Verify that both are configured to operate on the internal network.

Step 3

  • Verify connectivity between the machines.

Task 2: Zenmap Scanning

Step 1

  • Open Zenmap and perform an Intense scan on the Metasploitable machine.

Step 2

  • Perform Intense and UDP scans on the Metasploitable machine.

Step 3

  • Perform a slow comprehensive scan on the Metasploitable machine.