Now, we will use Nexpose to perform a more advanced and in-depth scan of our NAT network. We will use Nexpose in a more aggressive fashion against our target machines.
Advanced vulnerability scanning with Nexpose
Getting ready
Let's ensure the following prerequisites:
- Kali Linux is running and you are logged in as root
- Disconnect the host-only network, and use the NAT network on all VMs
- Start Metasploitable and your Windows XP machine with the NAT network connected
The Nexpose installation and operation can be confused with multiple interfaces and multiple connections. For this and all recipes that involve Nexpose we will be doing everything on the NAT network. After you are done with the recipes involving Nexpose,...