Run your Kali Linux VM, your metasploitable 2 Linux VM, and your vulnerable WinXP VMs together. Make sure they can see each other (i.e., they are in the same LAN). If you have run Armitage on your Kali Linux VM before, please open Armitage, remove all hosts in the Armitage target window, and then restart your Armitage to do this assignment.
(1). Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage. Use screenshot image to show the Armitage interface where the target window section will only show two computers’ icons with the correct OS information (after removing all other unrelated network devices). These two computers should be the metasploitable Linux VM and the WinXP VM.
(2). After completing the above scanning process, use ‘Hail Mary’ flooding attack to let Armitage conduct all possible attacks to these two target machines. When Hail Mary attack finishes, the two VMs should have been compromised (red light-bolted!). Use screenshot image to show the Armitage interface after the attack finishes.
[Hint:] The vulnerable WinXP VM I provided still has firewall enabled. You need to disable the firewall in order for Armitage to have remote shell created by using the default ‘bind’ shell mode.
CS 340 Milestone One Guidelines and Rubric Overview: For this assignment, you will implement the fundamental operations of create, read, update,
Retail Transaction Programming Project Project Requirements: Develop a program to emulate a purchase transaction at a retail store. This
7COM1028 Secure Systems Programming Referral Coursework: Secure
Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip
CS 340 Final Project Guidelines and Rubric Overview The final project will encompass developing a web service using a software stack and impleme