Your content here
Basic TCP scan: nmap -sT <IP/range>
Basic UDP scan: nmap -sU <IP/range>
Basic UDP scan will take long time in comparison to TCP, roughtly 100times longer
Single port scan: nmap -sT <IP/range> -p <Port Number>
Guess the OS/Service names: nmap -sT -A <IP/range>
From https://docs.rapid7.com/metasploit/metasploitable-2/
Metasploitable 2 is an intentionally vulnerable Ubuntu Linux virtual machine that is designed for testing common vulnerabilities. This virtual machine (VM) is compatible with VMWare, VirtualBox, and other common virtualization platforms.
Download is available in vmdk format (designed for VMware ESXi or VMware Player). I do not run either of these tool and instead use KVM/QEMU. Thankfully KVM/QEMU can read vmdk files and so there is no need to convert this to something like qcow2 format (though you can if you wish!)
To set this up, please follow this guide. I will assume that you already have the necessary files installed to run KVM/QEMU and at least have some basic understanding of the tool(s).
unzip metaploitable-linux-2.0.0.zip
cd Metasploitable-Linux
mv Metasploitable.vmdk /var/lib/libvirt/images/
wget 'https://raw.githubusercontent.com/FreedomBen/vmware-to-kvm/main/vmware2libvirt.py'
<source file='/var/lib/libvirt/images/Metasploitable.qcow2'/>
<source network='yourNetworkNameHere'>
which kvm
/usr/bin/kvm
. If you do not have this file, then you can check for the presence of 'qemu-kvm'. If this is present, then create a symbolic link:ln -s /path/to/qemu-kvm /usr/bin/kvm
#!/bin/sh
exec qemu-system-x86_64 -enable-kvm "$@"
sudo virsh -c qemu:///session define Metasploitable.xml
Domain 'Metasploitable2-Linux' defined from Metasploitable.xml
qemu-system-x86_64: The -accel and "-machine accel=" options are incompatible
<emulator>/usr/bin/qemu-system-x86_64>
and save the changes. I can now boot Metasploitable under KVM/QEMU