Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Creating a Hacking Demonstration Video: For the next two weeks, you and your red team members will focus on breaking into the target machines, stealing credentials and data

Creating a Hacking Demonstration Video: For the next two weeks, you and your red team members will focus on breaking into the target machines, stealing credentials and data

Computer Science

Creating a Hacking Demonstration Video: For the next two weeks, you and your red team members will focus on breaking into the target machines, stealing credentials and data. Each team member will pick one of the exploit categories for the Penetration Test Report. Take Note Your instructor will assign each team member a number so that each student has a unique set of credentials to recover and a different data set to steal. For example, if you are on Red Team #2 and are assigned Student #1, get the password hash for redteam2student1, and crack it using John the Ripper or other tool. If you are on Red Team #2 and are assigned Student #1, go into the redteam1 folder on the root directory on the victim machine. In that folder, you will find a folder called student1. There is a file called mypass.txt in that folder. Get the contents of the file from the victim out of the network and display it for the client to see. This week, you should start working on Project 2. One of the two deliverables for that project is a brief screen capture video demonstrating your exploitation of the exploit/category you select this week. In the video, you will describe the steps you took to penetrate the system and exfiltrate data. In Week 6, you will share your videos with your team in the discussion, and you will submit it for grading in Week 7. Video Requirements In your video, you will do a walk-though of the attack on the Linux system with your Kali box and explain how you were able to exploit the vulnerability as well as exfiltrate data. The video demonstration will be a powerful example of what occurs on an actual penetration test and will be an item that you can add to a portfolio. Your video should show the steps involved in penetrating the client’s system. The video will be created with Microsoft Stream. The video should be a maximum of 10 minutes but should not be shorter than 5 minutes. Include the following: introduction and purpose steps taken to break into the remote system and a discussion of the vulnerability you are exploiting an explanation of how you accessed the shadow file and what methods you used to crack the password hash an explanation of how you gained access to the confidential information on the system a summary of the steps taken in the video and recommendations for the company. My exploit for class is the PostgreSQL Port number 5432. Last week, you worked on the first portion of Project 2, the hacking demonstration video. This week, you should begin working on the written report. This is a three- to five-page Microsoft Word document that contains relevant information about your penetration test of the client's Linux machine.

Option 1

Low Cost Option
Download this past answer in few clicks

23.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions