I need screen shots of this and the out come..
For Lab two, run and map against your own network. Run a ping scan in discovery mode and then check out the image and operating system showcased by the scan inside your network. Write a one-page paper discussing your findings and how this might be used in black box penetration testing.