With the knowledge of the victim's network range and the active machines, we'll proceed with the port scanning process to retrieve the open TCP and UDP ports and access points.
The Apache web server must be started in order to complete this recipe.
Let's begin the process of finding open ports by opening a terminal window:
1000ports in this case):
nmap -p 1-1000 192.168.56.102