O'Reilly logo

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide by Lee Allen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Manual exploitation

At this point we should have two systems ready to go in our virtual environment: Our Kioptrix Level 1 machine which will be our target as well as our BackTrack machine which will be taking on the role of attacker. Before we can start with exploitation we need to determine our plan of attack.

Manual exploitation

Enumerating services

We will begin by locating the machine on our network using nmap. Open up a new terminal session and type:

nmap -f -n -P0 -v -p- -T4 192.168.75.0/24

We have instructed nmap to scan all TCP ports for IPs on 192.168.75.X using fragmented packets. Here is an excerpt of the results:

Scanning 192.168.75.14 [65535 ports] Discovered ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required