Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / CMIT 386 Week 5 Discussion Each team member will pick one of the following exploits for the Penetration Test Report, and the exploit you select will also be featured in a video describing the steps you took to penetrate the system and exfiltrate data

CMIT 386 Week 5 Discussion Each team member will pick one of the following exploits for the Penetration Test Report, and the exploit you select will also be featured in a video describing the steps you took to penetrate the system and exfiltrate data

Computer Science

CMIT 386 Week 5 Discussion

Each team member will pick one of the following exploits for the Penetration Test Report, and the exploit you select will also be featured in a video describing the steps you took to penetrate the system and exfiltrate data. Use the table below to claim an exploit category. No two team members should be using the same exploit.

Post your selection to the discussion thread. Categories will be selected on a first-come, first-serve basis. Any disputes over a category selection should be resolved with help from your instructor.

Exploit Category and
Port Number

Student

vsftpd (21)

 

SSHD (22)

 

Telnet (23)

 

HTTP (80)

 

SMB (445)

 

Remote Shell (514)

 

Java-RMI (1099)

 

shell (1524)

 

NFS (2049)

 

MySQL (3306)

 

distccd (3632)

 

PostgreSQL (5432)

 

IRC (6667)

 

For each red team member, there is a different set of credentials to recover and a different data set to steal.

For example:
If you are on Red Team #1 and are assigned Student #2, get the password hash for redteam1student2, and crack it using John the Ripper or other tool.

If you are on Red Team #1 and assigned Student #2, go into the redteam1 folder on the root directory on the victim machine. In that folder, you will find a folder called student2. There is a file called mypass.txt in that folder. Get the contents of the file from the victim out of the network and display it for the client to see.

Focus on the exploitation this week. Getting into the system is the most important task for a hacker. There are many exploits (listed above) that can be used to compromise a target system. After you establish a connection to the victim machine, work with red team members to help them break into the system they are targeting. A true red “team” will leave no one behind and will be ready to move to the next phase of the attack as a cohesive unit.

Example Video
This Exploit Hacking Demonstration Video shows an example of exploitation, credential dumping, and data exfiltration. This will help you see how to create your video demonstration. This will not be a professional-looking, polished video that would be presented to the client. Instead, it will be a video demonstrating the required steps to perform exploitation and postexploitation, and should include explanation from the presenter that details the use of tools and the results of their actions.

Option 1

Low Cost Option
Download this past answer in few clicks

17.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions