Skip to content

Scanning: Lab Task

Several Targets to scan in the Github Repo

Use namp to identify

  • Services running
  • Ports running on
  • Version numbers

Instructions

Starting Targets

Each of the targets is its own docker compose file.

  • In one terminal window navigate to the folder of the target you wish to work with
  • Start the stack with sudo docker-compose up

    • This builds the stack and starts the processes. It means that you will now get debugging information in this terminal
  • Open A SECOND TERMNINAL WINDOW.

  • Use Nmap in there.

Stopping Targets

  • In the window you used to run docker-compose
  • Stop the service with CTRL-C
  • Clean up with sudo docker-compose down

Targets

Target 1:

  • Services on Standard Ports

Target 2:

  • Services on non standard ports

Target 3:

  • Once you have identified the services try using NSE to detect a possible vulnerbility

Target 4:

  • This machine also has a well known vulnerbility. Use NSE to find it, then search for a relevant off the shelf exploit.