Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Netdiscover , Arp -scan , etc .) to identify networks and targets Identify what ports, services, and versions of software are running in the network

image text in transcribed
Netdiscover , Arp -scan , etc .) to identify networks and targets Identify what ports, services, and versions of software are running in the network environment Part B: Additionally , you will need to complete a vulnerability scan against your target host to identify vulnerabilities that you can then use to exploit to gain administrative /root access in the following project section Option 1 - Local Lab Choose any of the tools within your chosen Attack VM (Kali, Parrot OS, etc.) to map your network following the Part A requirements Choose any vulnerability scanning software to download , install and configure (Open VAS, Nessus, etc.) complete Part B. You should be able to find free "personal /home use versions )." Configure a scan to run against your target host . If your target host is a deliberately vulnerable machine you should find plenty of "critical /high " vulnerabilities to choose for your attack in the following project section Option 2 - Remote Lab You may choose to complete this portion of the project using the Infosec Learning Lab "Remote and Local Exploitation." No software downloads are required, so just configure your tools and complete the scans. Follow the requirements in the Project Section 2 Details. Part 3 - Exploitation: Gaining Access through A vulnerability identified during the vuln scan (Week 6) PROJECT SECTION 3 DETAILS: The third part of your project requires you to exploit a vulnerability of your choosing based on the previous section's scanning . The exploit should be through a Metasploit Module or other open - source/commercial tool or custom script /code . Select your vulnerability carefully. You should thoroughly research your vulnerability before you start to exploit it - which is the same process you would use in a professional capacity. The vulnerability MUST RESULT IN GAINING SYSTEM/ROOT ACCESS on the target host . Compromised credentials (including no password or weak password ) is not a sufficient vulnerability to exploit

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Cash Flows

Authors: Cyril Joseph

1st Edition

B0B84RHX2D, B0CPV8WDGT

More Books

Students also viewed these General Management questions