This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/ Penetration Testing (PEN)ianBachelor of Science in Cyber Security, Grand Canyon UniversityITT-307: Cyber Security FoundationsAl KellyFebruary 20, 2022 1This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/Using Kali VM and Nmap - Screenshots for ReproductionScreenshot 1- Scan of network 2This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/Screenshot 2 and 3- Open ports and services 3This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/4This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/There are different nmaps we can use to find different information and it is very easy to use. For example, there is a cheat sheet that shows the different options. 5This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:38:50 GMT -06:00https://www.coursehero.com/file/141579936/Penetration-Testingdocx/Using this sheet, we can access a lot of information through the terminal.One vulnerabilityOne vulnerability on the targets that can be exploited is the open ports. There are automated scripts that can run all known exploits on an open port especially on Linux versions like Kali Linux which we are using for this