Mapping Internal Network Exposure Using Kali Linux and Nmap

Written by:

Intro

I built this virtual lab to simulate internal network reconnaissance. This hands-on exercise used Kali Linux, Nmap, and a host-only VirtualBox environment to discover open ports, services, and OS fingerprints on a target Windows VM.

Lab Setup

MachineIP AddressRole
Kali Linux VM192.168.56.102Attacker
Windows VM192.168.56.101Target Host
  • VirtualBox: Host-only network (isolated)
  • Kali Tools Used: Nmap, nano
  • Recon Folder: ~/labs/recon01

Nmap Recon Command

Ran a full TCP port scan with service and OS detection:

nmap -sS -sV -O -p- 192.168.56.101 -oN full-scan.txt

  • -sS: Stealth SYN scan – sends a TCP SYN and analyzes the response without competing the handshake. Common for port scanning
  • -sV: Detect service versions – Nmap probes open ports to guess the version of running services.
  • -O: Try to fingerprint OS – Uses TCP/IP stack to fingerprint the target OS (Windows Server 2022)
  • -p-: Scans all 65,535 TCP ports
  • -oN full-scan.txt: Saves the output in a readable format to a filled called full-scan.txt

Key Results

PortStateServiceNotes
5985openwsmanWindows Remote Management (WinRM)
  • Host responded with latency -> same subnet
  • 65,534 filtered ports (Likely firewall)
  • VirtualBox NIC detected
  • OS guessed: Windows Server 2022 / 2016 (92% accuracy)

Lateral Movement Analysis

  • WinRM port (5985) open could allow remote Powershell or command execution with valid credentials.
  • All other ports filtered -> potential host-based firewall or hardened config.
  • No SMB, RDP, or FTP observed.

Report & Documentation

All findings documented in:

  • report.md: Markdown Report
  • full-scan.txt: Full Nmap output

These files are available on my Github:

GitHub Repo: recon-lab01

Why This matters

This lab wasn’t just about scanning, it was about thinking like an anlyst:

  • Asking, “What could an attacker see inside this network?”
  • Turning output into defensible report

Leave a comment