- Nmap
- Metasploit
- UFW Firewall
- VirtualBox
- Ubuntu
Made sure my Virtualbox was installed, configured and ready:
Downloaded the Metasploit 2 Zip file:
Unzipped the File and installed "Metasploitable.vmdk" in my Virtualbox:
Launched Metasploit and login with the default password:
Confirmed the ip address as my target:
Also confirmed Metasploit performance on web:
Sent a ping request from my Ubuntu to Metasploit:
Conducted a scan of all TCP ports on the host using the -sT parameter in Nmap:
Also conducted a scan of all UDP ports on the host using the -sU parameter in Nmap:
As the Metasploit machine is intentionally designed to be vulnerable, my ability to directly address the vulnerabilities or open ports found on the host was restricted. Therefore, I opted to install and enable a firewall as a proactive measure to mitigate these issues:
I implemented a firewall configuration to deny all TCP connections deemed at risk, effectively enhancing the security posture of the system:
I extended the firewall configuration to deny all UDP connections identified as potentially risky, further bolstering the security measures of the system.: