The two centos virtual machines are configured to run in “host only” mode.

Lab Description: You are contracted by a company to perform a security assessment of their network. Your first task is to conduct a vulnerability scan of the company’s FTP server as they believe the newly configured server, and more specifically the FTP service, may have a vulnerability. The company has provided you with a CentOS […]