Identify exploits of common vulnerabilities

Assignment Help PL-SQL Programming
Reference no: EM132324598

Vulnerability Exploitation Assignment -

Lab Objectives - This activity will address module outcome. Upon completion of this activity, you will be able to:

  • Identify exploits of common vulnerabilities.
  • Use industry tools to explore password guessing and/or cracking.
  • Demonstrate the impact of discovered vulnerabilities through ethical exploitation.

This week we will work with vulnerability validation, exploitation, and post-exploitation. We will leverage an automated tool called Armitage. It is a Graphical User Interface for the Metasploit Framework. We will use it import Nmap and Nessus scan results, find attacks based on these results, exploit them if possible, and facilitate interaction with the target. After successful exploitation, we will search for username and password hashes and crack them as a post-exploitation activity.

Lab Instructions -

Review the provided videos for this module and any related references.

Use the provided videos to help you complete the assignment.

Save or locate saved reports for scans with Nmap (XML format) and OpenVas (NBE Format).

Start Armitage, interface for the Metasploit Framework.

Import the Nmap and OpenVas reports.

Search for attacks.

Exploit any vulnerabilities presented in the video tutorial.

Dump all password hashes for the Metasploitable target and crack them using Johnny, GUI for John the Ripper password cracker.

Update the table with results from the previous weeks to add the exploit that was used and if the exploitation was successful. You need to add columns for:

  • Exploit - what is the exploit you used to gain access to the system or escalate privileges. Example. /exploit/linux/ftp/vsftpd2.3.4
  • Exploit Success - was the exploit successful or not. Example, yes/true, no/false, partial (if partial explain)

Example table with Note that all columns need to be filled at this stage with results where they are present.

Completed step-by-step instructions with full-screen screenshots - Example of full-screen screenshot.

Lab Deliverables -

Full-screen screenshot for each exploit, which you validated successfully as shown in the "Exploitation" video

Full-screen screenshot for the cracked passwords with the Johnny password cracking post-exploitation activity as shown in the "Post-Exploitation" video.

Make sure each full-screen screenshot is accompanied by a brief explanation of the results, file, etc.

  • If you only upload screenshots without an explanation, you will receive "0" points for the assignment.
  • If you do not upload full-screen screenshots, you will receive "0" points for the assignment.
  • Do not upload just screenshots or you will receive "0" points for the assignment.

Completed table with results with Nmap, OpenVas, and Exploit information as specified in the "Instructions" section of this lab.

Attach the table with results in Excel format to your assignment dropbox for M7A1.

Attachment:- Assignment File.rar

Verified Expert

In this assignment, I have tidied the requirement.Here I have install the dware and download the metasploitable Linux 2 virtual machine.Here,I have also install open as on karli Linux and configure the openvas.

Reference no: EM132324598

Questions Cloud

Describe four specific psychosocial factors : Describe four specific psychosocial factors that should be taken into account in order to understand the psychosocial context when working with the group you.
System for rapidly developing software : Extreme Programming is a system for rapidly developing software. One of the tenets of XP is that all code is written
Identify presenting problem for the case study you selected : Your presentation should address the following: Identify the presenting problem for the case study you selected. (Remember the presenting problem has to be.
What is the total execution time of the instruction sequence : CMSC411 Computer Architecture-University of Maryland Baltimore County-US-What is the total execution time of this instruction sequence without forwarding.
Identify exploits of common vulnerabilities : M7A1: Vulnerability Exploitation Assignment - Use industry tools to explore password guessing and/or cracking. Identify exploits of common vulnerabilities
Reimbursed for hcpcs code g0102 : Based on the NCCI policies, determine if the physician will be reimbursed for HCPCS code G0102
What are the three judicial powers of the president : According to the text, what are the three judicial powers of the president. Provide one example (form the text) of how a president have used one of these judici
Ethical and moral dilemmas in using peer-to-peer networks : What are the ethical and moral dilemmas in using peer-to-peer networks? Are they fundamentally right or wrong?
How organizations implement their it systems : Does the public have the right to know how organizations implement their IT systems?

Reviews

inf2324598

7/17/2019 4:37:40 AM

All the requirements are fulfilled by the given solution. I would like to use your services again and again. I will surely recommend your services to all my friends!!!!! I am happy with the work and revision that you guys made for me. Ecerything eas done in time and with perfect accuracy. I would like to thank Eric who really helped me a lot for all the revision work that I asked for. Thanks a lot.

len2324598

6/18/2019 11:28:08 PM

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides, please follow uploading guidelines provided by your instructor. Check your work and correct any spelling or grammatical errors. Once submitted, your assignment will be evaluated by Turnitin automatically. You will be able to view an Originality Report within minutes of your first submission that will show how much of your work has been identified as similar to other sources such as websites, textbooks, or other student papers. Use your Originality Report as a learning tool to identify areas of your assignment that you may not have cited appropriately.

Write a Review

PL-SQL Programming Questions & Answers

  Create a database model

Create a database model and Submit the table creation statements for the Database Model.

  Write pl-sql procedures and functions

Write PL/SQL procedures and functions to populate and query that database

  Sql questions

Write a query to display using the employees table the EMPLOYEE_ID, FIRST_NAME, LAST_NAME and HIRE_DATE of every employee who was hired after to 1 January, 1995.

  Run the lab_03_01.sql script

Run the lab_03_01.sql script in the attached file to create the SAL_HISTORY table. Display the structure of the SAL_HISTORY table.

  Write sql queries

Write a query to display the last name, department number, and salary of any employee whose department number and salary both match the department number and salary of any employee who earns a commission.

  Explaining sql insert statement to insert new row in cds

Write down a SQL insert statement to insert new row in "CDS" table.

  Write down name of actors in ascending order

Write down actors (or actress, your choice, but not both) who have won at least two (2) Academy Awards for best actor/actress. Provide the actor name, movie title & year. Order the result by actor name."

  What is an sql injection attack

What is an SQL injection attack? Explain how it works, and what precautions must be taken to prevent SQL injection attacks.What are two advantages of encrypting data stored in the database?

  Determine resonant frequency in series rlc resonant circuit

Given the series RLC resonant circuit in the figure, operating at variable frequency, determine: The resonant frequency ω o ,  The circuit’s quality factor Q , The cut-off frequencies, f 1  & f 2  and the bandwidth BW

  Query that uses cube operator to return lineitemsum

Write summary query which uses CUBE operator to return LineItemSum (which is the sum of InvoiceLineItemAmount) group by Account(an alias for AccountDesciption).

  Query to show customers were missing for existing orders

As DBA, your manager called a meeting and asked why there are so many orders for customers that don't exist in the customer table. Write query which would shows which customers were missing for existing orders. Use a join or a subquery.

  Sql query into a relational algebra statement

Turn this SQL query into a relational algebra statement? SELECT Request.reqfor, Ordering.invamt, Ordering.invnbr, Ordering.invdat

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd