
Host discovery, port scanning, service/version detection, and script-based fingerprinting with Nmap.
This document covers active reconnaissance using Nmap and companion tools inside a contained, virtualized lab with three VMs. We perform host discovery (arp-scan, fping, and Nmap ping scan), then move into TCP/UDP scanning and service fingerprinting. Finally, we use NSE scripts to enumerate common services on a Metasploitable2 host.
Run ARP, ping sweeps, and Nmap discovery to identify live hosts on the local network.
Leverage Nmap Scripting Engine to enumerate service details and potential misconfigurations.