Question
1. In Part 1 of the lab, we were introduced to netcat . Answer the question below. What did we do with netcat in Part
1. In Part 1 of the lab, we were introduced to netcat. Answer the question below.
What did we do with netcat in Part 1 of the lab? Specify ports, the IP address, and what that IP address represents. |
|
Given the command we entered, and the results that were displayed, how would we use netcat in a hacking attack? Think not only in terms of the open ports, but other ports, especially those that are not considered well-known ports. |
|
2. In Part 1 we scanned for open ports. Given what we did in Part 2 . . .
Why did we scan for open ports? |
|
Worth 4 points
3. In Part 2 we established a connection to the OpenSUSE virtual machine using netcat, and then in Part 3, we transferred a file from the Kali VM to the OpenSUSE VM.
How can establishing this connection and then performing the file transfer be used in a hacking attack? There are really two reasons. Give BOTH. |
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started