ethical hacking penetration testing, Computer Network Security

Assignment Help:
Get a copy of Metasploitable at https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Make
sure to follow these directions very carefully. You will get points off if you don''t do the right thing.

Perform the following:

1-Do a SYN scan using nmap.

2-Do a NULL scan using nmap.

3-Use OpenVAS to do a vulnerability scan.

4- Use metasploit/Armitage to exploit Metasploitable. Gather the following information: password hashes, system info, user ID you are connected as.

Write a report based on these activities. This is to be a report, not just a collection of screen captures. What did you do? How did you do it? What did you get for results? This should include narrative around why you are doing what you are doing and what it means.

Please provide screen captures for these steps.

Related Discussions:- ethical hacking penetration testing

Direct indexing, DIRECT INDEXING It is less usually known method. It i...

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

X.509, Consider the details of the X.509 certificate shown below. a. Identi...

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

routing information exchange and bellman-ford algorithm, You are free to d...

You are free to design the format and structure of the routing table kept locally by each node and exchanged among neighboring nodes. 1. Upon the activation of the program, each

Describe header fields present in a udp segment, Question (a) In relati...

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

Arp message format, ARP MESSAGE FORMAT Although the ARP data packet fo...

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Fragment identification, FRAGMENT IDENTIFICATION: IDENT field in every...

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

What is information security, What is information security Information s...

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

Ipv6 next header, IPV6 NEXT HEADER It is given in the figure below:

IPV6 NEXT HEADER It is given in the figure below:

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Risk assessment, RISK ASSESSMENT Risk assessment is a step in a risk man...

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd