Closed

Tutoring for metasploit

Part 1: [url removed, login to view] Adventures 15 points

Preface: You must provide screenshoots of each of the following. Number your responses. Points will

be deducted for unnumbered, unorganized responses Unnumbered screenshots may be returned to you

to number with the appropriate letter. Make sure your name is visible in the background for all

screenshots (see below image). I will check the logs to ensure each student logs in.

Notice also how the screenshot is not the entire desktop. Screenshots that are unreadable or include vast

amounts of other material will not be accepted.

Provide the following screenshots:

**If it is not obvious, provide any necessary commentary.

**Unless otherwise specified, only provide ONE screenshot for each of the following.

A. Show how you found the ip address for candy.lane.

B. Show your use of nmap to identify open ports on candy.lane.

C. Show your use of OpenVas to identify vulnerabilities on candy.lane. You are required to run a

vulnerability scan and provide the screenshot, but you may use other methods as well to find

vulnerabilities. Please describe and include up to two additional screenshots if this applies.

D. Show your use of Metasploit to compromise candy.lane. What is the exploit? What are the options?

You may include two or three screenshots here.

E. Obtain a meterpreter shell on candy.lane. Partial credit for other shells is available.

F. Navigate and find the confidential secret

G. Use five meterpreter commands. You may use two or three screenshots here if necessary.

H. Obtain passwords for users. Your method of doing this will vary, and it is at your discretion is to

how you perform this.

Part 2: [url removed, login to view] Redux 15 points

Preface: There is another target owned by the same business. Can you find it? There are a couple ways.

First, you could use some of the techniques in our earlier phases to find the location. You also might

find information in the [url removed, login to view] machine. Hint: Try looking in My Documents.

Screenshots

**If it is not obvious, provide any necessary commentary.

A. How did you find the ip address for the new target?

B. Show your use of nmap to identify open ports for this target.

C. Show your use of OpenVas to identify vulnerabilities on the target. You are required to run a

vulnerability scan and provide the screenshot, but you may use other methods as well to find

vulnerabilities. Please describe and include up to two additional screenshots if this applies.

D. Show your use of Metasploit to compromise the target. In this case, you may open up the machine if

you wish to and interact with it. (Hint: You may need a password to do this.) That way you can make

use of client side attacks. For instance, you might give the user a link to click on, and you could

simulate that yourself. How you compromise this is up to you. You may use multiple screenshots here.

E. Obtain a meterpreter shell. Partial credit for other shells is available.

F. Use five meterpreter commands. You may use two or three screenshots here if necessary.

H. Obtain passwords for users.

Part 3: Questions 10 points

***Screenshots are not acceptable for these questions. Provide typed responses.

1. List all the domains you found.

2. List all the IP addresses you found. Provide identifying information, e.g. ports open. Can you

identify any services or software (versions)?

3. Where does the DNS come from? What do you know about it?

Bonus Varies based on quality

1. What is the Candy Lane bank routing number? (This is not on one of the above two targets.) Notes:

You do not need to use Metasploit here, although you could attempt it. Show how you found it.

2. Can you find an exploit that is not in Metasploit and integrate it into Metasploit and use it to obtain

a shell on any of the machines? Provide a very detailed writeup and screenshots as proof (or substitute

a link to a brief video walkthrough if you prefer).

Skills: .NET, C++ Programming, Linux, UNIX, Visual Basic

See more: metasploit unleashed pdf 2017, metasploit tutorial for beginners, metasploit tutorial kali, metasploit unleashed pdf, oscp training videos download, metasploit unleashed pdf 2016, what is metasploit, kali linux metasploit tutorial pdf, where to find a person that can make a presentation with music videos, website id and password how to make, top online business i can do that can make me money, products that can make business, i need a company that can make a customized metallic logo for my shoe brand and also cufflinks and belt logo, i m looking for a sport shoe designer to create a new product for me company in thailand that could make different sports clothi, company that will make 3d rendering in uae

About the Employer:
( 2 reviews ) Los Gatos, United States

Project ID: #15778100

4 freelancers are bidding on average $113 for this job

juhiravikant

Hi, I am certified ethical hacker. Your assignment need skillset of ethical hacker. Please ping me for further discussion. Thanks and have a good day

$200 USD in 7 days
(8 Reviews)
4.3
gloriasudoso

A proposal has not yet been provided

$35 USD in 2 days
(1 Review)
1.8
khalodamohamed68

I'm penetration tester expert and ethical hacker I have excellent experience in the field of ethical hacking additionally malware/backdoor Removal specialist, network analysis, vulnerability assessment, website assessm More

$138 USD in 3 days
(0 Reviews)
0.0
kingsmanrbd

Hi, good day!! I have good experience in vulnerability assessment and penetration testing. i have done network & web application penetration testing assignments for large clients. i have expertise in handling the tr More

$77 USD in 2 days
(0 Reviews)
0.0