With the knowledge of the victim's network range and the active machines, we'll proceed with the port scanning process to retrieve the open TCP and UDP ports and access points.
The Apache web server must be started in order to complete this recipe.
Let's begin the process of finding open ports by opening a terminal window:
nmap 192.168.56.102
1000
ports in this case):
nmap -p 1-1000 192.168.56.102
22
:No credit card required