In this post, I will be exploring what reconnaissance look like from an attacker point of view.
Modern Cyber Range is based off of this story.
The purpose of showcase the endpoint detection that I'm working with.
After setting up my Kali Linux (Attacker) and my vulnerable server metasploitable2, I'm ready to try scanning it and see the network activity it generates.
Today, I'm going configure Metasploitable3 (Linux) Network Configuration