Here we will be scanning with Metasploit and using 2 scanners and one of your own choice.

Remember scanners are located under auxiliary/scanner

  • TCP Scanner – 10 points
  • use auxiliary/scanner/portscan/tcp
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • UDP Probe – 10 Points
  • use auxiliary/scanner/discovery/udp_probe
  • show options
  • set rhosts to the ip address of your first machine – you’ll need the ip of the target
  • Capture the returned information – cut and paste and add it to your report
  • – Repeat the process with your 2nd machine
  • Scan of your choice – 10 Points
  • Review the scanners and choose at least 1 scanner to scan both of your metasploitable machine with. Remember one is Linux and the other is Microsoft so not all scanners work with both.
  • Capture the returned information – cut and paste and add it to your report

Rubric:

  • Captured returned results from tcp scanner for both machines – 10 Points
  • Captured returned results from udp_probe scanner for both machines – 10 Points
  • Captured returned results from <scan of your choice> for both machines – 10 Points

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!