lmkahotline.blogg.se

How to use nessus backtrack 5
How to use nessus backtrack 5




how to use nessus backtrack 5

Some features of nmap are reviewed and an nmap XML report is generated. The nmap default NSE scripts provide additional information on the services and help nmap discover the precise version. Additionally, open ports are enumerated nmap along with the services running. In the video the Metasploitable-2 host is running at 192.168.56.102 and the Backtrack 5-R2 host at 192.168.56.1.3. Initially, nmap is used to locate the Metasploitable-2 machine on the Virtual Box host only network. (Note: A video tutorial on installing Metasploitable 2 is available at the link Tutorial on installing Metasploitable 2.0 on a Virtual Box Host Only network.) Recon is assumed because Virtual Box runs a default DHCP server on the 192.168.56/24 network). (Covering tracks and reporting are not covered. With this lab network set up, the demonstration walks through a practice pen-test using the phases of recon, scanning, exploitation, post-exploitation, and maintaining access. Two machines a test host (Backtrack 5-R2) and a target host (Metasploitable-2) are set up on a VirtualBox host-only network.

how to use nessus backtrack 5 how to use nessus backtrack 5

This video tutorial covers exploiting Metasploitable-2 to get a root shell and eventually a terminal via a valid "sudo-able" login over SSH.






How to use nessus backtrack 5