Hire Experts For Answers
Order NowRelated Study Services
- Homework Answers
- Coursework writing help
- Term paper writing help
- Writing Help
- Paper Writing Help
- Research paper help
- Thesis Help
- Dissertation Help
- Case study writing service
- Capstone Project Writing Help
- Lab report Writing
- Take my online class
- Take my online exam
- Do my test for me
- Do my homework
- Do my math homework
- Online Assignment Help
- Do my assignment
- Essay Writing Help
- Write my college essay
- Write my essay for me
DESCRIPTION
Posted
Modified
Viewed
17
This week, you should start working on Project 2. One of the two deliverables for that project is a brief screen capture video demonstrating your exploitation of the exploit/category you select this week. In the video, you will describe the steps you took to penetrate the system and exfiltrate data. In Week 6, you will share your videos with your team in the discussion, and you will submit it for grading in Week 7.
Video Requirements
In your video, you will do a walk-though of the attack on the Linux system with your Kali box and explain how you were able to exploit the vulnerability as well as exfiltrate data. The video demonstration will be a powerful example of what occurs on an actual penetration test and will be an item that you can add to a portfolio.
Your video should show the steps involved in penetrating the client’s system. The video will be created with Microsoft Stream. The video should be a maximum of 10 minutes but should not be shorter than 5 minutes.
Include the following:
introduction and purpose
steps taken to break into the remote system and a discussion of the vulnerability you are exploiting
an explanation of how you accessed the shadow file and what methods you used to crack the password hash
an explanation of how you gained access to the confidential information on the system
a summary of the steps taken in the video and recommendations for the company
This order does not have tags, yet.
Attachments
Penetration Test Report
Prepared for Hotel Dorsey
Name:
Team Number: 5
Student Number:5
Introduction
In this section, provide an overview and discuss the scope of the penetration test. Note the name of the operating system of the attack machine and discuss the tools that you will use (e.g., Zenmap, Metasploit). Keep in mind that this report will be reviewed by nontechnical people who may not know about the tools.
The Pentester will be using Zenmap and Kali OpenVAS, the most trusted and popular security testing tools.
The IP address of the attack machine is 10.5.5.50 Kali Linux
The IP address of the target machine is 10.5.5.100 Metasploit
Target
In this section, list the IP address and hostname of the target system as well as the IP address assigned to the attack machine. Focus on the open ports and describe the corresponding services associated with the open ports, placing this information into a table. Keep in mind that this report will be reviewed by nontechnical people who will not know about FTP or SSH or may not know what functions the services provide on a network. Provide a screenshot of the Zenmap scan. All screenshots and tables should be labeled for your report.
Vulnerability
In this section, discuss the specific vulnerability you are using to exploit the remote system. Provide a description of the vulnerability and how you used the vulnerability to exploit the victim machine. Include the time of intrusion as well as a screenshot of your connection to the victim system. Finally, discuss the level of access you achieved on the box (Apache, root, etc.). Show screenshots using the getuid or whoami command to verify your level of access for your client (two screenshots). All screenshots and tables should be labeled for your report.
Data Exfiltration
In this section, explain how you were able to take the company’s sensitive data out of the network. Provide a screenshot of the method by which the data was extracted. Talk about the implications to the company and possible costs of losing proprietary data.
Recommendations
In this section, you will explain what security controls should be implemented to remediate the vulnerability that you have exploited on the remote system. Talk about the steps the client should take to ensure that the vulnerability is no longer present as well as any other suggestions you may have to help improve the overall security posture.
References
Explanations and Answers
0
No answers posted
Post your Answer - free or at a fee
NB: Post a homework question for free and get answers - free or paid homework help.
Get answers to: Penetration Test Report Prepared For Hotel Dorsey or similar questions only at Tutlance.
Related Questions
- A C++ Assignment That Uses Structs, Const, .H, And .Cpp Files All In One.
- M-Tree Data Loading And Modelling Have To Be Done Step By Step Because Professor Need To Valid Each Step
- Create A Python Program That Will Perform The Following Tasks. In Addition Summarize The Approach Taken, Show All Work.
- Cs-330 Comp Graphic And Visualization
- Google's Tenser Processing Unit And Acceleration Of Deep Neutral Networks
- Ml- Machine Learning: Regression Model Or Classification To Be Developed With Jupyter
- Build Simple Model Of Diffusion-Limited Growth Due To Matsuura [Mat00], Further Explored By Tronnolone Et Al. [Tts+18].
- Richardson School District Network Design Project - Logical Topology Assignment Help
- Implementing A Client Server Chat Room Using Tcp That Handles Messaging And Transferring Files Between Multiple Clients
- Polling Data Data Structures Lab With Priority Queues And Heaps
- System Integration And Architecture 1
- Arithmetic Expression Parse Tree Implementation
- Binary Search Tree Assignment
- Assembly Language (Arm) Using Visual Emulator
- Need Someone To Do My Haskell Programming Assessment
- Machine Language Course. This Assignment Focuses On Assembly Language(Armv8), Datapath And Control Diagram Of Processor.
- Polling Data Data Structures Lab With Priority Queues And Heaps
- Polling Data Data Structures Lab With Priority Queues And Heaps
- Machine Language Course. This Assignment Focuses On Assembly Language(Armv8), Datapath And Control Diagram Of Processor.
- Machine Language Course. This Assignment Focuses On Assembly Language(Armv8), Datapath And Control Diagram Of Processor.
- Coding Final Project: Route Tracker
- Computer Logic Design- 1 Bit And 4 Bit Adders
- Java And Xml Follow The Direction And Replicate The Project
- Number Memorization Game In Java With Gui
- Homework C++ Programming Assignment Cache Simulator
- Homework C++ Programming Assignment Cache Simulator
- Homework C++ Programming Assignment Cache Simulator
- Homework C++ Programming Assignment Cache Simulator
- Homework Cache Simulator In C++
- Homework Cache Simulator In C++
- Homework Cache Simulator In C++
- Homework Cache Simulator In C++
- Homework: Cache Simulator In C++
- Homework: Cache Simulator In C++
- Homework: Cache Simulator In C++
- Homework: Cache Simulator In C++
- To Host Events. Make A Comparison Which Shows The Population Changes Over A Suitable Period Of Time.
- Nmap Help Cyber Security Assignment
- Convolutions And Digital Holography In Matlab
- Wireshark Help With Exercise 1-8
- Intro To Artificial Intelligence Assignment
- Can You Make This Webpage For Me Please?
- K-Means Clustering And Knn Classification
- C++ Implement A Singly Linked List
- Intro To Cs -- Create A Time Class, Which Will Be Useful For Measuring Lengths Of Time In Python.
- A Contact Organizer With A Generic Adt Sorted List And Adt Address Book
- A Small Networking Project Case
- Wireshark Assignmnet For Me To Rcord
- C++ Help A Beginner Out;Pass And Use Command Line Arguments, <Fstream> Library, Read From Files Into Arrays,
- Network Monitor With Snort3 Rules