7-3 Lab: Scanning the Network on the LAN: Ethical Hacking and System Defense

 

Log in to InfoSec to complete the labs below and take screenshots at the steps below:

Ethical Hacking and System Defense

  1. Scanning – Step 9 – Challenge #2 and #3 Complete
  2. Scanning – Step 11 – Challenge #4 Complete
  3. Scanning With Metasploit And Armitage – Step 23 – Armitage Scan Complete
  4. Exploitation – Step 7 – /etc/shadow Output
  5. Exploitation – Step 25 – Showing All 4 systems Compromised

To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!