Table of Contents
Introduction
This document covers active reconnaissance using Nmap and companion tools inside a contained, virtualized lab with three VMs. We perform host discovery (arp-scan, fping, and Nmap ping scan), then move into TCP/UDP scanning and service fingerprinting. Finally, we use NSE scripts to enumerate common services on a Metasploitable2 host.
Host Discovery
Run ARP, ping sweeps, and Nmap discovery to identify live hosts on the local network.
Port Scanning & Host Fingerprinting
Fingerprinting with Nmap Scripts
Leverage Nmap Scripting Engine to enumerate service details and potential misconfigurations.
FTP Enumeration
SSH Enumeration
SMB Enumeration
Web Server Enumeration