Sparta offers a great deal of functionality out of the box. In this recipe, we will take a look at the Sparta interface, explore what Sparta does by default when you add hosts to the scope, look at some of the tools Sparta utilizes, and brute-force passwords.
Information gathering with Sparta
Getting ready
Sparta comes pre-bundled with Kali Linux 2. To use it to perform scans, you will need to have a remote system that is running network services. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on how to set up Metasploitable2, refer to Chapter 1, Getting Started.