Zenmap

Explain how you were able to take the company’s sensitive data out of the network. Provide a screenshot of the method by which the data was extracted.

Penetration Test Report Prepared for Hotel Dorsey Introduction In this section, provide an overview and discuss the scope of the penetration test. Note the name of the operating system of the attack machine and discuss the tools that you will use (e.g., Zenmap, Metasploit). Keep in mind that this report will be reviewed by nontechnical […]

Provide a brief introduction explaining the services performed and a summary at the end with the important findings of the scan.

ASSIGNMENT IP Address: 10.redteam[team number#].student[student number#].50 For example, if you were on red team 1, and the fourth student alphabetically, you would input 10.redteam1.student4.50 for the IP address. Step 2: Download the Two Virtual Machines Kali With OpenVAS (Attack Machine) (7 GB) (login root, pass tour), Metasploitable (Victim Machine) (1.3 GB)( login msfadmin, pass msfadmin) […]

Describe the procedures and tools used to discover the port scanning threats and the systems affected.

Instructions This assessment is a lab that you must complete and an executive briefing report you need to write for the chief information security officer (CISO) at the organization where you work. Be sure you read the instructions for the entire assessment carefully to make sure you address all requirements fully. Complete the Using Ethical […]

Scroll to top