
Explore active information gathering in Linux! This episode teaches you how to enumerate a vulnerable Bee-Box machine using Kali Linux tools. You'll learn Nmap for identifying open ports and services, and Metasploit for deeper SMTP enumeration, strengthening your reconnaissance skills.
Link: Bee-Box official download page
Commands: nmap -Pn -sS –sV <Bee-Box IP Address>
nmap -Pn -sS -sV -p 25 <Bee-Box IP Address>
auxiliary/scanner/smtp/smtp_enum
set RHOSTS <IP of the Bee-Box>
set THREADS <Number of Logical Processors>