Pretty much all of Fall 2024
After Width: | Height: | Size: 26 KiB |
After Width: | Height: | Size: 135 KiB |
@ -0,0 +1,36 @@
|
||||
# Ethical Hacking Assignment 3 - Aidan Sharpe
|
||||
|
||||
## Task 1 - Network Configuration Between Kali and Metasploitable
|
||||
Ensure proper network connectivity between the attacker (Kali Linux) and victim (Metasploitable) virtual machines.
|
||||
|
||||
1. Configure both Kali Linux and Metasploitable VMs to use host-only adapters
|
||||
|
||||

|
||||

|
||||
2. Verify the network connectivity by pinging Metasploitable from Kali Linux
|
||||
|
||||

|
||||
|
||||
## Task 2 - Nmap Scan for Open Ports and Vulnerabilities
|
||||
Use `nmap` to perform a vulnerability scan of the metasploitable machine.
|
||||

|
||||
|
||||
## Task 3 - Installing and Launching Armitage
|
||||
Install Armitage and set it up to connect with the Metasploit framework.
|
||||
|
||||

|
||||
|
||||
## Task 4 - Perform a Vulnerability Scan with Armitage
|
||||
Use Armitage to scan the Metasploitable machine and identify potential vulnerabilities.
|
||||
|
||||

|
||||
|
||||
## Task 5 - Exploiting a Vulnerability Using Armitage
|
||||
Use Armitage to exploit a vulnerability on the Metasploitable machine and gain access.
|
||||
|
||||

|
||||
|
||||
## Reflection
|
||||
The `nmap` tool is suprisingly easy, yet very powerful. After using it on this assignment, I used it to learn about vulnerabilities on my home server. I found that I had ports 80, 443, and 22 open. I did not realize that I had left it open, and I couldn't remembery why I had it open in the first place. I then used a remote network configuration tool to close port 80. After running `nmap` again, I saw that I had successfully closed the port.
|
||||
|
||||
I really enjoyed using Armitage as an easy introduction to the Metasploit Framework. At this point, I really only plan to use it as a learning tool to get used to deploying attacks and scanning networks. Today, for example, I learned about scanning IP ranges. My next step is to switch to the metasploit CLI.
|
After Width: | Height: | Size: 62 KiB |
After Width: | Height: | Size: 84 KiB |
After Width: | Height: | Size: 83 KiB |
After Width: | Height: | Size: 202 KiB |
After Width: | Height: | Size: 56 KiB |