Class 2 Lab 3 ‐ Zenmap Network Scanning - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki
Task 1: Environment Configuration
Step 1
- Open the Kali and Metasploitable machines.
Step 2
- Verify that both are configured to operate on the internal network.
Step 3
- Verify connectivity between the machines.
Task 2: Zenmap Scanning
Step 1
- Open Zenmap and perform an Intense scan on the Metasploitable machine.
Step 2
- Perform Intense and UDP scans on the Metasploitable machine.
Step 3
- Perform a slow comprehensive scan on the Metasploitable machine.