3. 1. Turn on red and blue VM’s. Log on as
‘student’ to both.
• On red : Execute the following command : ‘nmap –sP 10.0.2.0/24’
This will run a ping scan on our 10.0.2.0/24 network. This is where
our VM’s live on the network.
4. 10.0.2.12 is blue
• From our screenshot we can see that our nmap scan found 10.0.2.11
( red ) and 10.0.2.12 ( blue )
• We can gather more information about blue by rescanning it with
different flags.
5. ‘nmap –sV –T4 –F 10.0.2.12’
• -sV is a flag that scans for service version detection
• -T4 is a flag that scams for Timing ( T has many options ranging from
0-5)
• -F is a flag that scans the top 100 most common ports ( F for FAST)
7. From this scan we can derive the following :
• The host has a very low latency ( 0.00049s )
• The host has 97 ports that are closed ( Remember we only scanned
100 using the –F (fast) flag)
• Port 22 is open, running SSH ( the service ), and using OpenSSH 7.2 (
protocol 2.0 )
• Port 37 is open, Runnig the time service.
• Port 113 is open, and running the identity service.