Professional Documents
Culture Documents
2
Reminder : Internet Model (TCP/IP)
3
Reminder : Internet Model (TCP/IP)
4
Reminder : TCP connection
5
Discovery with nmap
6
Discovery with nmap
7
Discovery with nmap
8
Discovery with nmap
9
Discovery with nmap
Figure 6 : an example
Showing how nmap can
Bypass firewall filters.
10
Discovery with nmap
11
Metasploit
12
Metasploit
13
Metasploit + Metasploitable
14
Android Trojan with metasploit
15
Android Trojan with metasploit
16
External links
[1]
https://information.rapid7.com/download-metas
ploitable-2017.html
[2]
https://nmap.org/book/man-host-discovery.html
17