Create a text file on the attacker kali

Assignment Help Management Information Sys
Reference no: EM133438314

Question: You need to create an executable payload with the required configurations below. Once your payload is ready, you should upload it to the web server running on Kali Linux and download the payload from Windows 7, then execute it on the target to make a reverse shell (20 pt). Of course, don't forget to configure your Metasploit on Kali Linux before the payload is triggered on the target VM.

The requirements for your payload are (10 pt, 5pt each):
• Payload Name: Use your MIDAS ID (for example, pjiang.exe)
• Listening port: DDMMYY (It is based on your current timestamp. For example, today's date is
March 9th, 2023. Then, you should configure the listening port as 9323.)
[Post-exploitation] Once you have established the reverse shell connection to the target Windows 7, complete the following tasks in your meterpreter shell:

1. Execute the screenshot command to take a screenshot of the target machine if the exploit is successful.

2. Create a text file on the attacker Kali named "IMadeIT-YourMIDAS.txt" (replace YourMIDAS with your university MIDAS ID) and put the current timestamp in the file. Upload this file to the target's desktop. Then log in to Windows 7 VM and check if the file exists. You need to show me the command that uploads the file.

Reference no: EM133438314

Questions Cloud

Interoperability among health care information systems : Some IT professionals believe that the technology currently exists for achieving interoperability among health care information systems, particularly EHRs.
Name processes that you would expect to see : Name processes that you would expect to see in place for information integrity and quality in an organization with an EIM culture
Describe some of the personal and psychological factors : Describe some of the personal and psychological factors that may influence what consumers buy and when they buy it. Identify the ways in which
How electronic commerce provides competitive advantages : Explain how information technology systems influence organizational strategies and Discuss how electronic commerce provides competitive advantages
Create a text file on the attacker kali : Create a text file on the attacker Kali named "IMadeIT-YourMIDAS.txt" (replace YourMIDAS with your university MIDAS ID) and put the current timestamp
Identify one jingle that you really dislike and another : Jingles are a popular creative form in radio advertising. Even so, there may be as many jingles that you don't want to hear again as there are ones that you
Explain how this example of evidence-based practice : Explain how this example of evidence-based practice using healthcare informatics seeks to improve clinical and/or preventive care.
Affect responses to toxic chemical : Discuss in-detail the five factors that affect responses to a toxic chemical.
Can you think of a real-life example of a company : Can you think of a real-life example of a company that could benefit from a marketing audit or brand audit? Why do you think this is the case?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Business help accounting information systemswhat are the

business help accounting information systemswhat are the purposes of accounting codes? how are they used? what is the

  How do these principles apply to it management

In your own words, explain the difference between IT Strategy, Tactics, and Operations. Why is it important to understand the differences? Why are plans needed at each level? How do these principles apply to IT Management? Create your own scen..

  Data management technology

The hardware and software used to transfer data in an organization is called: and The first step in the four-step model of business problem solving is

  Rate the importance of critical success factors

Rate the importance of critical success factors (CSF's) to successful ERP implementation in the order of most important to least important.

  What type of data marts would you suggest setting up

What type of data marts would you suggest setting up? Make sure you explain who will benefit from the data marts you suggest.

  Describe the current business rules for hth

Create an ERD for each of the above statements that describe the current business rules for HTH. For each new statement being the business rule, extend the ERD to include the additional business rule in the ERD (created in previous point for examp..

  The challenges of incorporating crowdsourcing in a design

Analyze and discuss at least three (3) challenges of incorporating crowdsourcing in a design project.

  Describe three popular e-commerce business models

Provide a definition of e-commerce based on your own understanding.Describe three popular e-commerce business models, outlining the characteristics of each.

  Create a document demonstrating appropriate security setting

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices.

  Why is a search engine a big data application

Mention four possible functions that a BI Competency Centre (BICC) would serve within an organization, and give a brief description of each.List and describe three levels or categories of analytics that are most often viewed as sequential and inde..

  Define one of the given threats to cybersecurity

From the following, define one of these threats to cybersecurity, then explain why you think that poses the greatest danger.

  Goal of implementing cbt technology

What the advantages and disadvantages there are over traditional face-to-face (instructor-led) classroom training sessions. Also looking to address questions such as: What is the goal of implementing CBT technology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd