

: ~# nmap -sT -sV -sV -O -n -Pn -p- 192.168.56.101ġ0000/tcp open http SimpleHTTPServer 0.6 (Python 2.7.3)ġ service unrecognized despite returning data. With the IP in hand, it was time to run an nmap scan. : ~# netdiscover -i eth1 -r 192.168.56.0/24Ĭurrently scanning: Finished! | Screen View: Unique Hostsģ Captured ARP Req/Rep packets, from 3 hosts. Again, note that this IP might change a few times in this post, but I promise that it is the same target. To start, I like to use netdiscover to find what IP my new virtual machine got. As long as you’re not copying and pasting my exact commands, you will be fine. I started this over a year ago, but ended up getting distracted by other posts and research. One last note: I apologize for the IPs switching between some commands. If you would like, you can also read my Brainpan 1 Walkthrough before getting started here. That said, you can also find Brainpan 2 as well as 3 on VulnHub. Finally back to VulnHub, and next up is my Brainpan 2 walkthrough.įor those who have never tried the series, I recommend starting with Brainpan 1 by superkojiman.
