Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. In Part 1 of the lab, we were introduced to netcat . Answer the question below. What did we do with netcat in Part

1. In Part 1 of the lab, we were introduced to netcat. Answer the question below.

What did we do with netcat in Part 1 of the lab? Specify ports, the IP address, and what that IP address represents.

Given the command we entered, and the results that were displayed, how would we use netcat in a hacking attack? Think not only in terms of the open ports, but other ports, especially those that are not considered well-known ports.

2. In Part 1 we scanned for open ports. Given what we did in Part 2 . . .

Why did we scan for open ports?

Worth 4 points

3. In Part 2 we established a connection to the OpenSUSE virtual machine using netcat, and then in Part 3, we transferred a file from the Kali VM to the OpenSUSE VM.

How can establishing this connection and then performing the file transfer be used in a hacking attack?

There are really two reasons. Give BOTH.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Factors Affecting Conflict

Answered: 1 week ago

Question

Describe the factors that lead to productive conflict

Answered: 1 week ago

Question

Understanding Conflict Conflict Triggers

Answered: 1 week ago