Metasploitable 2 has been released for a while I didn’t had a chance to use it . so I tried it today and I thought of writing what I’m trying on metaploitable on the blog .
so I started with a simple PING nmap scan on the internal network to see what are the hosts which is running at the moment
Starting Nmap 6.01 ( http://nmap.org ) at 2013-03-04 08:47 EST Nmap scan report for 192.168.1.1 Host is up (0.00093s latency). MAC Address: D8:6H:4C:EA:BB:B1 (Tp-link Technologies Co.) Nmap scan report for 192.168.1.100 Host is up. Nmap scan report for 192.168.1.101 Host is up (0.00022s latency). MAC Address: 00:64:BE:8M:YD:12 (Sony) Nmap scan report for 192.168.1.102 Host is up (0.0010s latency). MAC Address: 08:00:27:A2:76:F2 (Cadmus Computer Systems) Nmap done: 256 IP addresses (4 hosts up) scanned in 3.48 seconds