Fill This Form To Receive Instant Help
Homework answers / question archive / CMIT 386 Week 5 Discussion Each team member will pick one of the following exploits for the Penetration Test Report, and the exploit you select will also be featured in a video describing the steps you took to penetrate the system and exfiltrate data
CMIT 386 Week 5 Discussion
Each team member will pick one of the following exploits for the Penetration Test Report, and the exploit you select will also be featured in a video describing the steps you took to penetrate the system and exfiltrate data. Use the table below to claim an exploit category. No two team members should be using the same exploit. Post your selection to the discussion thread. Categories will be selected on a first-come, first-serve basis. Any disputes over a category selection should be resolved with help from your instructor.
For each red team member, there is a different set of credentials to recover and a different data set to steal. For example: If you are on Red Team #1 and assigned Student #2, go into the redteam1 folder on the root directory on the victim machine. In that folder, you will find a folder called student2. There is a file called mypass.txt in that folder. Get the contents of the file from the victim out of the network and display it for the client to see. Focus on the exploitation this week. Getting into the system is the most important task for a hacker. There are many exploits (listed above) that can be used to compromise a target system. After you establish a connection to the victim machine, work with red team members to help them break into the system they are targeting. A true red “team” will leave no one behind and will be ready to move to the next phase of the attack as a cohesive unit. Example Video |
Already member? Sign In