ethical hacking penetration testing, Computer Network Security

Assignment Help:
Get a copy of Metasploitable at https://sourceforge.net/projects/metasploitable/files/Metasploitable2/

Make
sure to follow these directions very carefully. You will get points off if you don''t do the right thing.

Perform the following:

1-Do a SYN scan using nmap.

2-Do a NULL scan using nmap.

3-Use OpenVAS to do a vulnerability scan.

4- Use metasploit/Armitage to exploit Metasploitable. Gather the following information: password hashes, system info, user ID you are connected as.

Write a report based on these activities. This is to be a report, not just a collection of screen captures. What did you do? How did you do it? What did you get for results? This should include narrative around why you are doing what you are doing and what it means.

Please provide screen captures for these steps.

Related Discussions:- ethical hacking penetration testing

Simplex data exchange, Simplex data exchange Simplex communication def...

Simplex data exchange Simplex communication defines to communication that happens in one direction only. Two definitions have made over time: a common definition, which is des

Syntax conversion, Write down the significance of the syntax conversion . S...

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Digital certificates-cryptography, Digital Certificates Digital Certific...

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

Produce a pcap file from a wireshark capture, Question requires you to prod...

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

802.11 wireless lans and csma/ca, 802.11 WIRELESS LANs AND CSMA/CA:  ...

802.11 WIRELESS LANs AND CSMA/CA:  IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data

Use the chinese remainder theorem to evaluate x, Use the Chinese remainder ...

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Difference between synchronous tdm and statistical tdm, Question (a) A CRC...

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Hardware, Hardware, Software, and Network Asset Identification What info...

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Network intrusion system, In this work a network intrusion system (package)...

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd