Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand how to best use Nmap;
Understand the principles of network and port scanning;
Understand how this intelligence is the foundation for “Ethical” Hacking.
Component Number (Box Case)
Raspberry Pi + Case
Kali SD Card
Power Supply Unit
The Common Vulnerabilities and Exposures (CVE) database is a great place to find specific vulnerabilities for protocols that will aid in the next phases of “Ethical” hacking, and Nmap provides a great foundation for information that is required for the “Ethical” Hack. Without this information there is no target for attack, nearly all of the tools used for penetration testing need an IP address to target and without this, the process quickly becomes very difficult. Nmap has many flags that can be used, including those that allow an attacker to avoid firewalls and Intrusion Detection Systems (IDS. Building up experience by scanning other devices on your network and understanding how to interpret the data you collect is vitally important. It is possible to create a script that will access Nmap every day and send daily reports and alerts if anything was to change.