Professional Documents
Culture Documents
Ethical Hacking and Peneteration Testing Lab1
Ethical Hacking and Peneteration Testing Lab1
DEHRADUN
BTECH-COMPUTER SCIENCE
ENGINEERING (HONS.)
CYBER SECURITY AND FORENSICS
BATCH: B2 (Hons.)
1. Launch your attacker machine (Kali virtual machine) and log in.
2. Open your terminal and type msfconsole to launch the metasploit framework.
3. Start your target machine and check the ip address using ifconfig.
4. After that, in the attacker machine, the msfconsole will launch the metasploitframework and you
can explore various functions of metasploit with ‘help’ command.
5. Now, run the nmap in msfconsole to identify the various services running onthe target system.
Command: nmap IP_target –sV.
\
Question 1
Identify the list of various services running on the target machine?
Identify open ports?