logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Muhammad AhmerComputer science
(5/5)

671 Answers

Hire Me
expert
StatAnalytica ExpertData mining
(5/5)

573 Answers

Hire Me
expert
Elis PanaseykooHistory
(5/5)

725 Answers

Hire Me
expert
Garardd BerwickData mining
(5/5)

569 Answers

Hire Me
Computer Network

Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Run your Kali Linux VM, your metasploitable 2 Linux VM, and your vulnerable WinXP VMs together. Make sure they can see each other (i.e., they are in the same LAN). If you have run Armitage on your Kali Linux VM before, please open Armitage, remove all hosts in the Armitage target window, and then restart your Armitage to do this assignment.

(1). Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage. Use screenshot image to show the Armitage interface where the target window section will only show two computers’ icons with the correct OS information (after removing all other unrelated network devices). These two computers should be the metasploitable Linux VM and the WinXP VM. 

(2). After completing the above scanning process, use ‘Hail Mary’ flooding attack to let Armitage conduct all possible attacks to these two target machines. When Hail Mary attack finishes, the two VMs should have been compromised (red light-bolted!). Use screenshot image to show the Armitage interface after the attack finishes.

[Hint:] The vulnerable WinXP VM I provided still has firewall enabled. You need to disable the firewall in order for Armitage to have remote shell created by using the default ‘bind’ shell mode.

 

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme