Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Anybody related to Computer Science/Information Technology Security that has Kali Linux can help? 1. Install KALI Linux and Cut and screenshot Below cut The KALI
Anybody related to Computer Science/Information Technology Security that has Kali Linux can help?
1. Install KALI Linux and Cut and screenshot Below cut The KALI Linux Main Screen SCREENSHOT HERE 2. We will be investigating the Website https://hack-yourself-first.com. To start this we will do a few simple things please type the command "whois hack-yourself-first" at the terminal prompt in KALI. Please paste the screen shot of the first several lines f the output (you will need to scroll up) SCREENSHOT HERE 3. What is the Date that this Domain created? What other information is in this that may come in helpful? ANSWER HERE 4. At the Terminal type the command "nmap hack-yourself-first.com" Paste the Screenshot and then describe what this means. Is this surprising in any way? SCREENSHOT HERE ANSWER HERE 5. At the Terminal type the command "nmap -A hack-yourself-first.com" Paste the screenshot. Explain how this is different than the previous command SCREENSHOT HERE ANSWER HERE 6. What Version of Web server is the victim using? What vendor uses this web server? Using google to find a vulnerability on this web server that might be found on this server. Please give the CVE number and a description of the vulnerability ANSWER HERE 7. There are 4 disallowed entries in robot.txt. What is robots.txt? (google is your friend) ANSWER HERE 8. With a web browser such as firefox or chrome try each of these directories (such as https://hack-yourself-first.com/scripts). One of the results is VERY interesting show a screenshot of that. You will know it when you see it SCREENSHOT HERE 9. Using the results of number 8,log into the website as an admin and paste a screenshot SCREENSHOT HERE 10. At the terminal type in the command "nikto -h hack-yourself-first.com ssl" Show a screenshot SCREENSHOT HERE 11. What is the IP address of the target system? ANSWER HERE 12. In the text it says there is an interesting cert/file. Why do you think this file is interesting? What is the name of the file? ANSWER HERE 13.Download the file and show screenshot of what is inside the file 14.What did you think about this lab? Should we have more assignments like this? ANSWER HEREStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started