MOVE ┌──(root㉿kali)-[/home/kali/Descargas] └─# bash auto_deploy.sh move.tar Estamos desplegando la máquina vulnerable, espere un momento. Máquina desplegada, su dirección IP es --> 172.17.0.2 Presiona Ctrl+C cuando termines con la máquina para eliminarla Once the host was identified, Nmap, a port scanning tool, was used to discover which services were running on the machine. The scan revealed port 80 (HTTP), 22 and 3000 were opened. ┌──(root㉿kali)-[/home/kali] └─# nmap -n -Pn -p- --min-rate 5000 172.17.0.2 -sV -vvv 2>/dev/null Starting Nmap 7.95 ( https://nmap.org ) at 2026-02-28 07:45 CET NSE: Loaded 47 scripts for scanning. Initiating ARP Ping Scan at 07:45 Scanning 172.17.0.2 [1 port] Completed ARP Ping Scan at 07:45, 0.10s elapsed (1 total hosts) Initiating SYN Stealth Scan at 07:45 Scanning 172.17.0.2 [65535 ports] Discovered open port 22/tcp on 172.17.0.2 Discovered open port 80/tcp on 172.17.0.2 Discovered open port 3000/tcp on 172.17....