OH JEEZ RICK! Here we go!

We start by running a simple Nmap scan to detect where our target VM is.

I have a LAN setup on 192.168.1.0 that I use as a home lab where several VMs are up sometimes so I cleaned up the output to show only the one we are interested in:

Found target placed on 192.168.1.5

Next thing is detecting open ports. Using Nmap we test every port and get the following:

Couple of side notes: - You can use -p- option instead of typing the range 1–65535 - I’m using -T4 to speed up the process because the network has 0 delay due to the fact that is completely virtualized inside a single host machine. That’s not the case in most real networks

We see there is a handful of ports available: 21, 22, 80, 9090, 13337, 22222 and 60000

Run another scan to get more info about the services running