Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Configure the Topology as the following in the Virtual BOX and fill up the following table as required: KALI or Parrot Windows XP METASPLOITABLE 2
Configure the Topology as the following in the Virtual BOX and fill up the following table as required: KALI or Parrot Windows XP METASPLOITABLE or NETWORK ADAPTER IP @ MAC@ Use a NMAP tool and perform the following scanning tasks: Vulnerability Scan to scan the Vulnerabilities in the Metasploitable or from the KALI or Parrot. NMAP Stealth ScansS to find the different services and ports available in the target Metasploitable or from the KALI or Parrot Perform the Brute Force attack on the FTP service running in the Metasploitable or Metasploitable Use Medusa and Hydra The Usernames file should be user.txt The Password file should be pass.txt Access the FTP Running in Metasploitable from the KALI Capture the Username and password using Wireshark in the Kali.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started