{"id":617,"date":"2025-03-05T03:44:00","date_gmt":"2025-03-05T03:44:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=617"},"modified":"2025-03-05T03:44:04","modified_gmt":"2025-03-05T03:44:04","slug":"lab-1-lab-preparation","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/lab-1-lab-preparation\/","title":{"rendered":"Lab 1 | Lab Preparation"},"content":{"rendered":"\n<p>Old Dominion University<br>CYSE 450: Ethical Hacking and Penetration Testing<br>Lab 1: Lab Preparation<br>Handout Date: January 23, 2025<br>Due Date: January 30, 2025, 11:59 pm<br>Total Points : 10<\/p>\n\n\n\n<p><br>Following the tutorials shared in the Week 0 module install the following softwares: VirtualBox\/UTM, Kali Linux( In VirtualBox\/UTM, Metasploitable 2 (in VirtualBox \/ UTM), Nmap (in Kali Linux ). <\/p>\n\n\n\n<p>Run the following command in Kali Linux : nmap sdf.org<br>\u2022 Take a screenshot showing the command and the corresponding resultant output. 2 points<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223356.png\"><img loading=\"lazy\" decoding=\"async\" width=\"634\" height=\"290\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223356.png\" alt=\"\" class=\"wp-image-618\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223356.png 634w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223356-300x137.png 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><br>\u2022 Check the IP address of Kali Linux using  ifconfig command. Attach a sreenshot showing the IP address. 1 point<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223550.png\"><img loading=\"lazy\" decoding=\"async\" width=\"692\" height=\"358\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223550.png\" alt=\"\" class=\"wp-image-619\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223550.png 692w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-223550-300x155.png 300w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Check the IP address of Metas p loitable 2 using ifconfig command and attach a screenshot showing the IP address.<br>1 point<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-224115.png\"><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"413\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-224115.png\" alt=\"\" class=\"wp-image-620\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-224115.png 738w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-224115-300x168.png 300w\" sizes=\"(max-width: 738px) 100vw, 738px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><br><\/p>\n\n\n\n<p>\u2022 Ping Metasploitable 2 from Kali Linux and vice versa. Use the  ping ip-address command to do that. Make sure you rep lace ip-address wit h the actual IP addresses of Kali Linux and Metasploitable 2. Attach necessary screenshots to show the ping packets being transmitted. 6 points<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/ping.png\"><img loading=\"lazy\" decoding=\"async\" width=\"657\" height=\"294\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/ping.png\" alt=\"\" class=\"wp-image-621\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/ping.png 657w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/ping-300x134.png 300w\" sizes=\"(max-width: 657px) 100vw, 657px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/msf.png\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"246\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/msf.png\" alt=\"\" class=\"wp-image-622\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/msf.png 745w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/msf-300x99.png 300w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Old Dominion UniversityCYSE 450: Ethical Hacking and Penetration TestingLab 1: Lab PreparationHandout Date: January 23, 2025Due Date: January 30, 2025, 11:59 pmTotal Points : 10 Following the tutorials shared in the Week 0 module install the following softwares: VirtualBox\/UTM, Kali Linux( In VirtualBox\/UTM, Metasploitable 2 (in VirtualBox \/ UTM), Nmap (in Kali Linux ). Run &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/lab-1-lab-preparation\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/617"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=617"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/617\/revisions"}],"predecessor-version":[{"id":623,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/617\/revisions\/623"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}