For Lab two, run and map against your own network on Kali. Run a ping scan in discovery mode and then check out the image and operating system showcased by the scan inside your network. Write a one-page paper discussing your findings and how this might be used in black box penetration testing.