At this point, we should have two systems ready to go in our virtual environment:
Our Kioptrix Level 1 machine, which will be our target
Our Kali machine, which will be taking on the role of an attacker
Before we can start with exploitation, we need to determine our plan of attack. An example of our environment is shown in the following image:
We will begin by locating the machine on our network using Nmap
. Open up a new terminal session and type:
nmap -f -n -P0 -v -p- -T4 192.168.75.0/24
We instructed Nmap
to scan all TCP ports for IPs on 192.168.75.X
using fragmented packets. Here is an excerpt of the results:
Scanning 192.168.75.14 [65535 ports] Discovered open port 139/tcp on 192.168.75.14 Discovered open port 80/tcp on 192.168.75.14 Discovered open port 22/tcp on 192.168.75.14 Discovered open port 443/tcp on 192.168.75.14 Discovered open port 111/tcp on 192.168.75.14 Discovered open port 32768/tcp on 192.168.75.14 Completed SYN Stealth Scan at 10:24...