Scanning: Lab Task
Several Targets to scan in the Github Repo
Use namp to identify
- Services running
- Ports running on
- Version numbers
Instructions
Starting Targets
Each of the targets is its own docker compose file.
- In one terminal window navigate to the folder of the target you wish to work with
-
Start the stack with
sudo docker-compose up
- This builds the stack and starts the processes. It means that you will now get debugging information in this terminal
-
Open A SECOND TERMNINAL WINDOW.
- Use Nmap in there.
Stopping Targets
- In the window you used to run docker-compose
- Stop the service with CTRL-C
- Clean up with
sudo docker-compose down
Targets
Target 1:
- Services on Standard Ports
Target 2:
- Services on non standard ports
Target 3:
- Once you have identified the services try using NSE to detect a possible vulnerbility
Target 4:
- This machine also has a well known vulnerbility. Use NSE to find it, then search for a relevant off the shelf exploit.