Introduction:
This NMAP project is a demonstration of network reconnaissance and exploitation using the NMAP (Network Mapper), which is a very handy tool for network discovery and auditing. In this example, we demonstrate the live device detection, open port discovery, and reaching a target device in a mock network. With the help of two virtual machines Kali Linux and Metasploitable 2, the project recreates a working network security scenario, demonstrating the value of network scan to discover vulnerabilities.
Objective:
To check for active machines and open ports in an emulated network.
To exploit spotted flaws with Metasploit and access a victim computer.
For testing and education : To model a working penetration test lab.
METHODOLOGY
In my case, I will be using Kali Linux combined with VMware.
The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. Version 2 of this virtual machine ships with even more vulnerabilities than the original image. This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network
