Earn Higher Grades With Instant Assignment Help.Ask Question!

Computer Network
(5/5)

Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Run your Kali Linux VM, your metasploitable 2 Linux VM, and your vulnerable WinXP VMs together. Make sure they can see each other (i.e., they are in the same LAN). If you have run Armitage on your Kali Linux VM before, please open Armitage, remove all hosts in the Armitage target window, and then restart your Armitage to do this assignment.

(1). Run Armitage on your Kali Linux, then conduct nmap scan (quick scan with OS detect) inside Armitage. Use screenshot image to show the Armitage interface where the target window section will only show two computers’ icons with the correct OS information (after removing all other unrelated network devices). These two computers should be the metasploitable Linux VM and the WinXP VM. 

(2). After completing the above scanning process, use ‘Hail Mary’ flooding attack to let Armitage conduct all possible attacks to these two target machines. When Hail Mary attack finishes, the two VMs should have been compromised (red light-bolted!). Use screenshot image to show the Armitage interface after the attack finishes.

[Hint:] The vulnerable WinXP VM I provided still has firewall enabled. You need to disable the firewall in order for Armitage to have remote shell created by using the default ‘bind’ shell mode.

 

Attachments:
(5/5)

Related Questions

CSI 1420 Introduction to C Programming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two majorconstructs of the C programming language – Fu

The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Assignment To Be Done By Our ExpertsGet A+ Grade Solution Guaranteed

expert
joyComputer science
(4/5)
12 Answers Hire Me
expert
Robert DLaw
(4.8/5)
904 Answers Hire Me
expert
Dr Samuel BarberaStatistics
(5/5)
623 Answers Hire Me
expert
Tutor For YouEconomics
(5/5)
848 Answers Hire Me