Question: Important Please note the following guidance: This lab assignment shauld be performed in the VCASTLE Pod. Also, any screenshots here are for general reference and
Important Please note the following guidance: This lab assignment shauld be performed in the VCASTLE Pod. Also, any screenshots here are for general reference and machines and IP address will vary to ensure they are meant only as a reference to encourage academic integrity. You are tasked with changing the mac address of the Windows 10 client using ParrotOS and macof as the tool. Basic assumptions are that you are able to use the tools listed and that you have completed the ilabs before starting the week 4 assessment. Instructions Malware Threats b3 T 1 1. Gain access to the system using a Trojan - use a software tool such as njRAT, ProRat, Theef RAT to build a Remote Access Trojan (RAT) server (optional) Use an encryption tool such as SwayzCryptor to encrypt the RAT to make it more difficult for it to be detected by anti-virus utilities Deliver the RAT to the target machine and execute it From the attacker machine where you built the RAT, look at the existing connection to the target and explore your options of exploiting the target document what you are doing to exploit the target (for example, using the keylogger, being able to control the mouse, webcam and microphone, being able to navigate the file system) Netlab arpspoof Ry =T Open Wireshark in Windows 10 as well as the command prompt. While at the command prompt identify the Mac address and Ip address for the gateway device that the client is connected to. Your screenshot will need to display that the mac address of the Windows 10 Machines gateway device as well as the IP address of the gateway machine and the local machine. This must be done from the command prompt only. Your ParrotOS screenshot will show the actual arpspoof application running generating traffic as well as the command you used to start the process. Your Wireshark on Windows 10 machine will now need to show the capture of the traffic from the ParrotOS machine. Now identify the the ip address of the source machine generating the traffic and what does it look like? Please provide a screenshot of the Wireshark output. 6. Leave Wireshark running for next lab Netlab macof Ry =T 1. Restart Wireshark on both Windows 10 and ParrotOS
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts