37 lines
1.8 KiB
Markdown
37 lines
1.8 KiB
Markdown
# Ethical Hacking Assignment 3 - Aidan Sharpe
|
|
|
|
## Task 1 - Network Configuration Between Kali and Metasploitable
|
|
Ensure proper network connectivity between the attacker (Kali Linux) and victim (Metasploitable) virtual machines.
|
|
|
|
1. Configure both Kali Linux and Metasploitable VMs to use host-only adapters
|
|
|
|

|
|

|
|
2. Verify the network connectivity by pinging Metasploitable from Kali Linux
|
|
|
|

|
|
|
|
## Task 2 - Nmap Scan for Open Ports and Vulnerabilities
|
|
Use `nmap` to perform a vulnerability scan of the metasploitable machine.
|
|

|
|
|
|
## Task 3 - Installing and Launching Armitage
|
|
Install Armitage and set it up to connect with the Metasploit framework.
|
|
|
|

|
|
|
|
## Task 4 - Perform a Vulnerability Scan with Armitage
|
|
Use Armitage to scan the Metasploitable machine and identify potential vulnerabilities.
|
|
|
|

|
|
|
|
## Task 5 - Exploiting a Vulnerability Using Armitage
|
|
Use Armitage to exploit a vulnerability on the Metasploitable machine and gain access.
|
|
|
|

|
|
|
|
## Reflection
|
|
The `nmap` tool is suprisingly easy, yet very powerful. After using it on this assignment, I used it to learn about vulnerabilities on my home server. I found that I had ports 80, 443, and 22 open. I did not realize that I had left it open, and I couldn't remembery why I had it open in the first place. I then used a remote network configuration tool to close port 80. After running `nmap` again, I saw that I had successfully closed the port.
|
|
|
|
I really enjoyed using Armitage as an easy introduction to the Metasploit Framework. At this point, I really only plan to use it as a learning tool to get used to deploying attacks and scanning networks. Today, for example, I learned about scanning IP ranges. My next step is to switch to the metasploit CLI.
|