Metasploit updating

Step 1 − To open, go to Applications → 01-Information Gathering → nmap or zenmap.

Step 2 − The next step is to detect the OS type/version of the target host.

Kali Linux is one of the best security packages of an ethical hacker, containing a set of tools divided by the categories.

It is an open source and its official webpage is https://org.

To install Kali Linux − A Virtual Box is particularly useful when you want to test something on Kali Linux that you are unsure of.A hacker sends a SYN packet to the target; if a SYN/ACK frame is received back, then it’s assumed the target would complete the connect and the port is listening.If an RST is received back from the target, then it is assumed the port isn’t active or is closed.NMAP and Zen MAP are useful tools for the scanning phase of Ethical Hacking in Kali Linux.NMAP and Zen MAP are practically the same tool, however NMAP uses command line while Zen MAP has a GUI.

Leave a Reply