ethical hacking penetration testing, Computer Network Security

Assignment Help:
Get a copy of Metasploitable at https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Make
sure to follow these directions very carefully. You will get points off if you don''t do the right thing.

Perform the following:

1-Do a SYN scan using nmap.

2-Do a NULL scan using nmap.

3-Use OpenVAS to do a vulnerability scan.

4- Use metasploit/Armitage to exploit Metasploitable. Gather the following information: password hashes, system info, user ID you are connected as.

Write a report based on these activities. This is to be a report, not just a collection of screen captures. What did you do? How did you do it? What did you get for results? This should include narrative around why you are doing what you are doing and what it means.

Please provide screen captures for these steps.

Related Discussions:- ethical hacking penetration testing

Secure a wireless network, Secure a Wireless Network WIRELES Most onli...

Secure a Wireless Network WIRELES Most online retailers provide some type of privacy statement. Many statements are long, and appear in small print, and many appear to be simi

What is mac address, MAC Address The address for a machine as it is id...

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n

Negative cycle algorithm in minimum cost flows, QUESTION: (a) Show the...

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

Point to point transmission(ppp), Normal 0 false false fals...

Normal 0 false false false EN-US X-NONE X-NONE

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Explain the purpose of the dr and bdr, QUESTION a) Compare and contras...

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Application gateways / firewall-information security, Application Gateways ...

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Issue-specific security policy (issp), Issue-Specific Security Policy (ISSP...

Issue-Specific Security Policy (ISSP) The ISSP addresses specific areas of technology, needs frequent updates and having statement on organization’s position on a particular iss

Base lining-information security, Base lining •    Organizations do not ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd