Kali pentesting assignment

Viewing 0 reply threads
  • Author
    Posts
    • #175842
      chloejane
      Participant

      Forgive if I have posted in the wrong area. Mods feel free to move it the correct location, if need be.
      I have an pentesting assignment for uni. I have 4 target hosts which I am attacking with Kali 2020.2. All are Virtualbox VMs. I am having a hard time finding anything about Host 4. Basic nmap scans are not picking up Host 4 Ip of my kali machine is 192.168.45.1. Network IP is 192,168.45.0/24. I cheated a bit and looked up the the DCHP leases in the Virtualbox config file.I know from that host 4 has an ip of 192.168.45.140 and port 2018 is open. I confirmed that with Kali

      $ nmap -Pn -p 2018 192.168.45.140

      PORT STATE SERVICE
      2018/tcp filtered terminaldb

      First off, how can I get the details of host 4 legitimately with Kali and secondly, where do I go from here? I can’t find much on terminaldb exploits

Viewing 0 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?