Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Anybody related to Computer Science/Information Technology Security that has Kali Linux can help? 1. Install KALI Linux and Cut and screenshot Below cut The KALI

Anybody related to Computer Science/Information Technology Security that has Kali Linux can help?

image text in transcribed

image text in transcribed

image text in transcribed

1. Install KALI Linux and Cut and screenshot Below cut The KALI Linux Main Screen SCREENSHOT HERE 2. We will be investigating the Website https://hack-yourself-first.com. To start this we will do a few simple things please type the command "whois hack-yourself-first" at the terminal prompt in KALI. Please paste the screen shot of the first several lines f the output (you will need to scroll up) SCREENSHOT HERE 3. What is the Date that this Domain created? What other information is in this that may come in helpful? ANSWER HERE 4. At the Terminal type the command "nmap hack-yourself-first.com" Paste the Screenshot and then describe what this means. Is this surprising in any way? SCREENSHOT HERE ANSWER HERE 5. At the Terminal type the command "nmap -A hack-yourself-first.com" Paste the screenshot. Explain how this is different than the previous command SCREENSHOT HERE ANSWER HERE 6. What Version of Web server is the victim using? What vendor uses this web server? Using google to find a vulnerability on this web server that might be found on this server. Please give the CVE number and a description of the vulnerability ANSWER HERE 7. There are 4 disallowed entries in robot.txt. What is robots.txt? (google is your friend) ANSWER HERE 8. With a web browser such as firefox or chrome try each of these directories (such as https://hack-yourself-first.com/scripts). One of the results is VERY interesting show a screenshot of that. You will know it when you see it SCREENSHOT HERE 9. Using the results of number 8,log into the website as an admin and paste a screenshot SCREENSHOT HERE 10. At the terminal type in the command "nikto -h hack-yourself-first.com ssl" Show a screenshot SCREENSHOT HERE 11. What is the IP address of the target system? ANSWER HERE 12. In the text it says there is an interesting cert/file. Why do you think this file is interesting? What is the name of the file? ANSWER HERE 13.Download the file and show screenshot of what is inside the file 14.What did you think about this lab? Should we have more assignments like this? ANSWER HERE

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managing Your Information How To Design And Create A Textual Database On Your Microcomputer

Authors: Tenopir, Carol, Lundeen, Gerald

1st Edition

1555700233, 9781555700232

More Books

Students also viewed these Databases questions