If you can see this check that
Authors: Rich Macfarlane, Gordon Russell
This practical covers an introduction to some elementary linux networking commands for pentesting, along with an introduction to network discovery and active scanning for targets. Remember if you try these in your own machine make sure you have permission, as running these on or over systems you have no permissions for is likely illegal.
Your virtual machine sits inside a virtual network, and this network connect you to other virtual machines. One of those machines is your network gateway. The gateway itself is a router, and this connects together all the virtual networks from yourself and other cloud users. Above this another router sits, connecting together cloud users running on different servers, and this in turn links to the main system gateway, connecting the virtual world to the real network via a NAT. This gives many networks to explore, but in reality layered firewalls within the virtual network prevent most explorations. For more details: https://ieeexplore.ieee.org/abstract/document/6296116
To reset all the check buttons from a previous attempt click here
Having a disaster
Centos 7 intro | Paths | BasicShell | Search |
Linux tutorials | intro1 | intro2 | wildcard | permission | pipe | vi | essential | admin | net | SELinux1 | SELinux2 | fwall | DNS | diag | Apache1 | Apache2 | log | Mail |
Caine 10.0 | Essentials | Basic | Search | Acquisition | SysIntro | grep | MBR | GPT | FAT | NTFS | FRMeta | FRTools | Browser | Mock Exam |
Caine 13.0 | Essentials | Basic | Search | |
Kali 2020-4 | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7 | 8a | 8b | 9 | 10 |
Kali 2024-4 | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7 | 8a | 8b | 9 | 10 |
Useful | Privacy Policy | Terms and Conditions |
Linuxzoo created by Gordon Russell.
@ Copyright 2004-2025 Edinburgh Napier University