Question: I need help with these questions, please also provide the screenshot of every question. Load zenmap and set the target for your entire NAT network

I need help with these questions, please also provide the screenshot of every question.

Load zenmap and set the target for your entire NAT network (mine was 10.0.2.0/24).

Default is intensive scan. Now press scan and wait patiently for full results.

1. Check out each host seen in the scan. Metasploitable was 10.0.2.7 on my network. I see many open ports on that system. As expected, the metasploitable is a mess with open ports including anonymous ftp, telnet, dns, and www. Explore the tabs in Zenmap. Now run a comprehensive scan against metasploitable. Explore the results. Answer the questions provided below based on your scan results. Get a screen capture for you report. Close zenmap.

2.From the command prompt run the specific nmap command recorded for your first zenmap scan in nmap (from question Q6 below). NSE is the nmap scripting engine. You will see it mentioned during the scan process. Answer the questions provided below based on your scan results. Dont forget to get a screen capture.

3. From the command prompt type nikto. Note the number and variety of options (flags) that are available.

Server: Apache/2.2.8 (Ubuntu) DAV/2

Retrieved x-powered-by header: PHP/5.2.4-2ubuntu5.10

These details about the web server version and PHP version may be useful in planning further hacking activities. Particularly notice the Tuning options. Try nikto -host -Tuning 1 Use the ip address of your metasploit target in this command. Several vulnerabilities may be disclosed. For example, OSVBD-877. Google this vulnerability to learn more. These insights may guide you to further attacks on this system. Try a few more of the Tuning options, especially 2, 4, 6, and 9.

Below is the question been ask for:

Q1) From the zenmap scan table provide the specific nmap command used for this scan.

Q2) How many different scans is nmap capable of performing? Q3) Do the results appear to be different between zenmap and nmap

Q4) What is the role of nikto for a pentester? Q5) Describe one interesting (useful) detail you learned from nikto.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!