Outcomes addressed in this activity:
Course Outcome:
Perform vulnerability tests using computer and network tools and utilities.
Purpose
The purpose of this lab is to hack a compromised host. You use Zenmap and OpenVAS to scan for vulnerabilities in a host and then use Metasploit to attack the target host. In the process you learn how to search for exploits and modules in Metasploit and how to configure various options.
In the last part of the lab you learn how to escalate privileges to the root.
Lab Instructions
Part 1:
Complete the lab âRemote and local Exploitation.â In the lab environment, you will find step-by-step instructions. As you work through the lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture.
Part 2:
After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Lab Requirements
Place your work from Part 1 and Part 2 into a Microsoft Word document. Support any assertions made with credible sources using APA style formatting.
For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.
Plagiarism
Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person's work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.
For more information on Universityâs Plagiarism policy, refer to the current University Catalog.
Directions for Submitting Your Lab
Name your Microsoft Word document according to this convention: IT542_Unit4_FirstNameInitialLastName. Submit your completed work to the Unit 4 Dropbox by the deadline. Also, download your performance report from infosec learning and upload the pdf as an additional document according to this convention: IT542_Unit4_FirstNameInitialLastName_Report.
Review Rubric under Course Resources, Grading Rubrics before beginning this activity.
Â