Question: In this assignment, you'll need VMs up and running: An Attack VM (Kali Linux) and a Target VM (Metasploitable). Make sure you post questions to

In this assignment, you'll need VMs up and running: An Attack VM (Kali Linux) and a Target VM (Metasploitable). Make sure you post questions to the forum or to me directly if you have any issues installing them on your desktop or school computer. Per the syllabus, cloud-based solutions are also an option (e.g. Amazon Web Services) at your expense.

Keep in mind this assignment is worth 20 points.

1. Download Metasploitable

http://sourceforge.net/projects/metasploitable/files/Metasploitable2/

2. Load up your Kali Linux VM and your Metasploitable 2 image

- Run your existing Kali Linux VM - Create a new VM pointing to the Metasploitable you downloaded. Here is a YouTube video on how to install the image in VWware (https://www.youtube.com/watch?v=cr4hVz45gP8)

3. Verify network connectivity. Submit screen captures (snippingtool, etc.) and/or command output to demonstrate BOTH VMs have a valid IP address.

- 'ifconfig' and 'ping' are great commands to test if you can connect to the Internet. The VMs are designed to grab an IP address automatically - Check to make sure VMWare Player or Virtual Box have the NIC enabled for the VMs, allowing network connectivity - 'ping' one host to the other and vice versa

4. Use 'nmap' from the Attack VM to scan the Target VM. Submit screen captures (snippingtool, etc.) of your use of 'nmap'.

- The 'nmap' command needs to scan the Metasploitable VM and list any 1) open ports, 2) services reported, 3) the version numbers, if any, and 4) operating system detected.

- Recall the commands in the previous assignment as they are valid for this assignment as well.

5. In your Attack VM, launch 'metasploit' to attack the Target VM. You'll have to research on the Internet what exploits to use to attack the Target VM, but luckily there are many involving vulnerabilities in nfs, samba, php, java, etc. Execute the following commands/steps and submit screen captures for all:

- 'use exploit/unix/.....'

- 'set RHOST ip address of target vm'

- 'exploit'

- open shell after exploiting

- 'whoami' to verity that you have root access on the Target VM

Submit this as a Word / RTF / PDF / Open Office document.

- Mac OS X does screen captures too: http://apple.stackexchange.com/questions/33906/alternative-to-windows-snipping-tool-for-mac-osx

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!