1. Using your scans from CYB 608 devise an attack plan for the target network
2. For each IP detected, list a minimum of two vulnerabilities that the target machine might be susceptible to.
3. For each vulnerability, list the CVE or OSVDB number, the metasploit exploit name (if available) and the mitigation which would correct the vulnerability