1. Complete Netlab 3 . 

    NETLAB 3. A. IDS Evasion. 

    1. Initiating Network Monitoring Application 
    2. Testing IDS results with Regular Nmap scan 
    3. Testing IDS results with decoy scan 
    4. Testing IDS results with Spoofed MAC Scan 
    5. NETLAB 3. B. Password Cracking With John The Ripper and Hashcat. 
    6. Generating Password List for Password Cracking 
    7. Create a User Account to be cracked. 
    8. Password cracking Using John the Ripper
    9. Password Cracking Using Hashcat 
    10. NETLAB 3. C. Metasploit Framework Fundamental & Armitage. 
      1. Getting familiar with Metasploit. Why do pen testers use Metasploit? 
      2. Vulnerability scanning Using the WMAO Module. 
      3. Configuring Exploits and Payloads. 
      4. Finding and Execuritn Attacks in Armitage. 
    11. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files  

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

 



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *