This lab will demonstrate the use of various Tools, Techniques, and Procedures for the enumeration of hosts discovered on a network. In network penetration testing, enumeration is the act of examining or observing a specific host or target to generate a list of services and ports for possible exploitation.  A penetration tester will use enumeration to locate ports, services, and software versions for possible exploit during the penetration test.

This lab will demonstrate the use of various Tools, Techniques, and Procedures to complete the exploitation of a target host based upon a known vulnerability.

The student should have completed the previous three labs in the Penetration Testing Using Kali Linux module: Reconnaissance, Enumeration, and Vulnerability Scanning. 

This lab will demonstrate the use of various Tools, Techniques, and Procedures to complete post-exploitation activities of a target host that has already been exploited.

The student should have completed the previous four labs in the Penetration Testing Using Kali Linux module: Reconnaissance, Enumeration, Vulnerability Scanning, and Exploitation.