To begin, we needed the tools in order to analyze and deploy attacks on the network. The Kali Linux distribution provides a wide array of tools for network penetration testing. In order for us to be able to scan the network without much struggle, we connected our Kali Linux virtual machine the CSE Link network. With this configuration, we were able to scan without having to go through our own router which would increase the number of hops needed. We configured our Kali box to allow for ssh connection as root so that we could all work at the same time and not have to rely upon the single vsphere console, nor take up excessive space in the virtual environment by cloning multiple Kali boxes.