ethical hacking penetration testing, Computer Network Security

Assignment Help:
Get a copy of Metasploitable at https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Make
sure to follow these directions very carefully. You will get points off if you don''t do the right thing.

Perform the following:

1-Do a SYN scan using nmap.

2-Do a NULL scan using nmap.

3-Use OpenVAS to do a vulnerability scan.

4- Use metasploit/Armitage to exploit Metasploitable. Gather the following information: password hashes, system info, user ID you are connected as.

Write a report based on these activities. This is to be a report, not just a collection of screen captures. What did you do? How did you do it? What did you get for results? This should include narrative around why you are doing what you are doing and what it means.

Please provide screen captures for these steps.

Related Discussions:- ethical hacking penetration testing

Intercultural sensitivity: recognising differences, Intercultural sensitivi...

Intercultural sensitivity: recognising differences You represent a Mauritian computer company which is negotiating to buy hardware from a manufacturer in Japan. In your first

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Udp- datagram transport service, UDP- DATAGRAM TRANSPORT SERVICE INT...

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

Location to e-mail messages are saved, In the e-mail system, where the e-ma...

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Error reporting mechanism (icmp), ERROR REPORTING MECHANISM (ICMP) INT...

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Describe des encryption, (a) Describe DES encryption with a block diagram a...

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

Define checksum, The method used to check errors is checksum . In this m...

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd