Do My Homework / Homework Help Answers / Computer security and reliability Homework Help / Kali VM assignment, searching for a secret file and hacking another VM

Kali VM assignment, searching for a secret file and hacking another VM

Online tutoring services

Need help with this question or any other Computer security and reliability assignment help task? Click on the button below to to hire an expert cheap.

The details are attached. I'll be providing the VMs, you'll just need to get the virtual box. Is not a hard assignment for an expert, I just need help with it.

Get Help With a similar task to - Kali VM assignment, searching for a secret file and hacking another VM

Login to view and/or buy answers.. or post an answer
Additional Instructions:
IA360 Network Security Final Examination SPRING 2021 Total Value: 300 points (roughly 60 points for each section) Due Date: April 25, 2021 @ 2359 The following exercises should be completed on your own, with no help from other students. Feel free to use online tutorials, manuals, and the like, but you shouldn't get help from other people or help others on this. If you have an administrative question, please contact me, but I will not answer technical questions. Record a video screen capture of your entire session, with the audio on. (Make sure everything looks and sounds good before you start!) You should aim to do this in a single take, with no stops and no editing. You should narrate what you're doing, and if it doesn't work on the first try, that's perfectly fine, but tell me what you're thinking—if there's silence and the screen isn't doing anything, it doesn't help me. If you need to go to the bathroom or take a phone call, please leave the recording running. Upload this recording to YouTube or some other video streaming site. Make the video visible only to those with a link or set it to private and give jhansen3@norwich.edu permission to watch it. PLEASE double-check that it’s visible to me and submit the URL on NUoodle. Then triple check that it’s visible to nobody else. No points if it’s made public. Now for an all-caps warning. Please don’t consider this TL;DR: GIVE YOURSELF ADEQUATE TIME TO UPLOAD THE FILE! IF IT IS A HUGE FILE, IT WILL TAKE A LONG TIME TO GET ON TO YOUTUBE AND FOR IT TO BE PROCESSED. I MUST HAVE THE LINK AND THE VIDEO MUST BE VISIBLE TO ME BY THE DATE AND TIME ABOVE! Now that we’re through with that, here's what you need to do: 1. Set up your network & local firewall in a Linux VM of your choice Start your recording. Set your VM’s network adapter to “Internal Network” with a name of “ia360final”. Once you’ve booted the VM, set your IP address to 10.3.60.100 with subnet mask 255.255.255.0. The default gateway is 10.3.60.1. Now ensure that all inbound connections to your machine are blocked, but that you don’t block your own outbound traffic. We’d do this so that other intrepid scanners on the network don’t accidentally find and target you (if we were on a real network). IA360 Network Security Final Examination SPRING 2021 2. Download the exam VM images from the link on NUoodle This download is reasonably large, and there are several VMs inside. If you’re on a slow connection, this can take a while, but once you have it downloaded, you’re good to go. Feel free to download this in advance. Please make sure you have at least 12 GB of disk space available on your machine. Import the two OVA files directly into VirtualBox. The VMDK file and the VHD file will need a bit more setup: a. ia360-host41: Create a Windows XP (32-bit) VM and attach this VHD file as the hard drive. Set the network to “Internal Network” with a name of “ia360final”. b. ia360-host89: Create a FreeBSD (64-bit) VM and attach this VMDK file as the hard drive. Set the network to “Internal Network” with a name of “ia360final”. 3. Scan the local network to which your VM is attached Identify all the machines on the local network, including IP addresses, any open ports, operating system, and other relevant information. Does the network offer Internet access? (Please be sure to only scan the target network!) 4. Download the secret file There’s a file that’s downloadable from one of the machines without any exploits. Once you’ve downloaded it, show me the SHA-1 hash of the file in your video. Is it C34F2079F02A43D5FCE3FA9490DFF465B52F7204? If it isn’t, you have the wrong file! The file will show you my proposed cure for COVID-19 (in addition to staying home, that is). 5. ‘Sploits! Ensuring that it's one of the VMs in the target network and not on your home network, compromise a target. Show me that you’re actually in, but please don’t do anything. Rules of Engagement 1. Please follow all University policies. 2. VMs crash, and it is OK if you have to restart one or more in the process of this exam. 3. Hacking tools have a bad reputation. Have this assignment with you at all times and show it if your activity is challenged. 4. Please refer any questions you get about this exercise to me—best first step would be to reach me on Discord, but you can call or text me at 802-279-6054 if necessary. 5. Do not work on these exercises near or in the same room as any other students. 6. Do not attack or attempt to gain access to any machines outside the VM network. 7. If this were a real exercise, the rules would be much more complicated. 8. Take a deep breath when you’re done. You’ve earned it!

Related Questions

Similar orders to Kali VM assignment, searching for a secret file and hacking another VM
45
Views
0
Answers
Finding arguements and the value of X
ITN 171 Unix course. It is an introductory course so nothing in depth. Just need 2 multiple choice questions answered and one small script written with a screen capture taken and sent in. Assignment is DUE 12/15/21 by 5pm est...
42
Views
0
Answers
Public key encryption and AES encryption
Consider the following hybrid encryption scheme. Instead of signing and encrypting a file directly using public-key encryption, I generate a random session password, and use that password to encrypt the file in question using a strong secret-key algorithm such as AES. I then sign/encrypt (just) the session password. Finally, I distribute the AES-encrypted file along with the signed/encrypted password. Would this method work for preserving the confidentiality and integrity of the file in question? What are the advantages and disadvantages of this method over using just public-key encryption throughout?...
75
Views
0
Answers
Homework for my computer science lab
1.Objective:The objective of this programming project is to examinereadinga file, parsingdata,performingcalculation on data, andsome basics on Date/Time.After completing the project, studentswill have an intermediateunderstanding ofreadingfileand performing calculation ondataand basics of Date/Timefunction in Java.2.Project Specification:2.1.Overall ProgramBehavior:The futuristic smart city will have intelligent transportation systems where every vehicle will be able to communicate with each other. Hence accident will be prevented, and human lives and property will be saved. Also, driving will be much easier, in many cases, no traffic signal will be required.This is the concept of vehicular ad hoc network (VANET).For this project, we are using a dataset from a VANETclustering algorithmfrom here: https://doi.org/10.1007/s12243-021-00881-9. However, weare using a small portion of over one hundredthousanddata. We provided Driver.java and vanetp1data.txt [donot edit these two files]. You are required to create and write necessary classes, methods, etc.to complete the project based on this project description and Driver.java we provided. 2.2 InputFile:I...
127
Views
0
Answers
Intro to computer security - threat modeling assignment
The assignment has to do with Threat Modeling for my Intro to Computer Security Course. This assignment will consist of identifying 100 threats to potential security risks for a pretend company called “LB Pharma”. You will be provided with a spreadsheet called Pharma Data which is all that you will need to complete the assignment. Your Job will be to fill out the “Threat findings” spreadsheet with threats to the company's security. You may assume that the staff at the company has no idea what they are doing. You will also be provided a spreadsheet called "Threat Model Info" which will also have helpful tools that will make this assignment much easier, (especially the NIST Cybersecurity framework tab) The grade on this assignment will be determined by the quality of the threat findings you produce. You are being asked to identify 100 legitimate threat findings along with a proper proposed mitigation(s) for the threat. Your job is to identify threats and propose a mitigation to the threats identified for a pretend company. The pretend company will be called "Long Beach Pharma, Inc." and they are a pharmaceutical company. The pharmaceutical company has hired you to ...