Run your Kali Linux VM, your metasploitable 2 Linux VM, and your vulnerable WinXP VMs together. Make sure they can see each other (i.e., they are in the same LAN). If you have run Armitage on your Kali Linux VM before, please open Armitage, remove all hosts in the Armitage target window, and then restart your Armitage to do this assignment.
(1). Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage. Use screenshot image to show the Armitage interface where the target window section will only show two computers’ icons with the correct OS information (after removing all other unrelated network devices). These two computers should be the metasploitable Linux VM and the WinXP VM.
(2). After completing the above scanning process, use ‘Hail Mary’ flooding attack to let Armitage conduct all possible attacks to these two target machines. When Hail Mary attack finishes, the two VMs should have been compromised (red light-bolted!). Use screenshot image to show the Armitage interface after the attack finishes.
[Hint:] The vulnerable WinXP VM I provided still has firewall enabled. You need to disable the firewall in order for Armitage to have remote shell created by using the default ‘bind’ shell mode.
DescriptionIn this final assignment, the students will demonstrate their ability to apply two majorconstructs of the C programming language – Fu
Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t
Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th
1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of
1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of