First, Nmap was used to port scan the target machine and enumerate running services with the -sV flag. nmap -sV 192.168.130.130 Starting Nmap 7.30 ( https=//nmap.org ) at 2016-10-25 11:47 MDT Nmap scan report for 192.168.130.130 Host is up (0.000071s latency). Not shown= 998 closed ports PORT STATE SERVICE VERSION 9999/tcp open abyss? 10000/tcp open http SimpleHTTPServer 0.6 (Python 2.7.3) MAC Address= 00:0C:29:4E:E6:A7 (VMware) Service detection performed. Please report any incorrect results at https=//nmap.