Professional Documents
Culture Documents
Presentation:
The objective of this Lab is to learn how an attacker uses the network scanning attack as a
main step in the process of compromising and networked device.
Note: It should be noted that the reproduction of this approach on a company's site
without its approval is punishable by law.
In order to accomplish this lab, we will choose the VM Metasploitable, which is a good start
for this kind of exercise.