In this case, let us leave it as default and click Next.

Step 4 − Click Next and the following Custom Setup screenshot pops up. The Virtual Box application will now open as shown in the following screenshot.

After filling the above form, we can download the software. Step 4 − Click “Use an existing virtual hard disk file”.

metasploit updating-39metasploit updating-29

A hacker sends a SYN packet to the target; if a SYN/ACK frame is received back, then it’s assumed the target would complete the connect and the port is listening.

If an RST is received back from the target, then it is assumed the port isn’t active or is closed.

Let’s understand how you can download and install the Virtual Box on your system. Depending on your operating system, select the right package.

In this case, it will be the first one for Windows as shown in the following screenshot. Step 3 − The next page will give you options to choose the location where you want to install the application.

Kali Linux is one of the best security packages of an ethical hacker, containing a set of tools divided by the categories.

It is an open source and its official webpage is https://org.Step 1 − To open, go to Applications → 01-Information Gathering → nmap or zenmap.Step 2 − The next step is to detect the OS type/version of the target host.To scan all the TCP ports based on NMAP, use the following command − Where the parameter “–p” indicates all the TCP ports that have to be scanned.In this case, we are scanning all the ports and “-T4” is the speed of scanning at which NMAP has to run. In green are all the TCP open ports and in red are all the closed ports.NMAP is a free utility tool for network discovery and security auditing.