Question: Write Nmap command to do TCP scan scan on Metasploitable VM ( Nmap sT IP of the Metasploitable ) . Leave the scan running, and
Write Nmap command to do TCP scan scan on Metasploitable VM Nmap sT IP of the Metasploitable Leave the scan running, and access the web server on the Metasploitable machine from the Kali VM web browser by writing the Metasploitable IP in the URL space as shown below. Click on MyPhpAdmin link. Once the scan finish stop the WireShark capture and save it as pcapng file on Kali VM desktopUse the terminal to navigate to the desktop and apply the ls l on the desktop to show the Wireshark fileStart Wireshark again and open the saved capture use the capture to explain how the Nmap do the TCP scan, hint way handshakeWhat are the first five ports involved in the TCP handshake.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
