Question: computer network and security please amswer these two will leave good rating do this on a google cloud system 3. When the system administrators of
3. When the system administrators of the target network were experimenting with Metasploit, they captured a screen session of the activities. The file is called msf.txt and it is posted to a Linux web server on the target range in the admin directory. Locate the screen capture and copy the SAM file to your Google VM. HINT: you can install several text-based web browsers using the command sudo apt Install vim links lynx. You can also use SSH port forwarding if you want to use your own browser. 4. Use John the Ripper to crack the password of the Target User HINT: Windows 7 3. When the system administrators of the target network were experimenting with Metasploit, they captured a screen session of the activities. The file is called msf.txt and it is posted to a Linux web server on the target range in the admin directory. Locate the screen capture and copy the SAM file to your Google VM. HINT: you can install several text-based web browsers using the command sudo apt Install vim links lynx. You can also use SSH port forwarding if you want to use your own browser. 4. Use John the Ripper to crack the password of the Target User HINT: Windows 7
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
