Question: Task 2 : Wireshark Now start Wireshark in Kali VM . Choose eth 0 to capture the traffic. Write Nmap command to do TCP scan
Task: Wireshark
Now start Wireshark in Kali VM Choose eth to capture the traffic.
Write Nmap command to do TCP scan scan on Metasploitable VM Nmap sT IP of the Metasploitable" Leave the scan running, and access the web server on the Metasploitable machine from the Kali VM web browser by writing the Metasploitable IP in the URL space as shown below. Click on MyPhpAdmin link. Once the scan finish stop the WireShark capture and save it as pcapng file on Kali VM desktop.
Use the terminal to navigate to the desktop and apply the ls on the desktop to show the Wireshark file.
Start Wireshark again and open the saved capture, use the capture to explain how the Nmap do the TCP scan, hint way handshake
What are the first five ports involved in the TCP handshake.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
