Log in to InfoSec to complete the labs below and take screenshots at the steps below:
Ethical Hacking and System Defense
- Scanning – Step 9 – Challenge #2 and #3 Complete
- Scanning – Step 11 – Challenge #4 Complete
- Scanning With Metasploit And Armitage – Step 23 – Armitage Scan Complete
- Exploitation – Step 7 – /etc/shadow Output
- Exploitation – Step 25 – Showing All 4 systems Compromised
To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.