![hydra brute force port scan hydra brute force port scan](https://img.wonderhowto.com/img/56/13/63625699313767/0/image.w1456.jpg)
To do this I used the well known and very popular open source tool for network exploration and security auditing called Nmap created by Fyodor. Here the goal is to find any open ports, which services are they offering and which operating systems are they running. By knowing your target you can go directly into the scanning phase. The steps are reconnaissance, scanning, exploit, keeping access and covering tracks.
![hydra brute force port scan hydra brute force port scan](https://securityonline.info/wp-content/uploads/2017/05/1-1-1.jpg)
The admirable Ed Skoudis describes the anatomy of an attack as a 5 step model. With the environment ready I could start. This machine was positioned in the wan side of the setup. Kali Linux was my choice because this distribution brings the tools needed to execute the steps an intruder will eventually perform during an attack. After having the network in place I needed an arsenal of tools that allowed me to perform offensive techniques. The wan port connected to the internet and the internal port connected to the internal network. I left the remaining settings by default. I only configured the basic settings such as IP addresses, routing, admin user and basic firewall rules allowing management access from Internet. To get the environment ready I used a refurbished Fortigate 100 box running FortiOS 4.0. Then, among other things I use this knowledge to create effective defenses and have some fun! As result I could practice, learn and perform offensive techniques. I may well use this environment to perform tactics and techniques than an attacker might carry out in order to compromise a target. This weekend I got some time off and decided to build a small network environment that represented real-world security issues and their respective flaws.