Question: Overview One machine will act as the attacker machine one machine will be the victim machine. Requirements The lab prep lab (Lab 0) must have
Overview
One machine will act as the attacker machine one machine will be the victim machine.
Requirements
The lab prep lab (Lab 0) must have been completed before proceeding
Ensure both network adapters on Kali and the Metasploitable virtual
machines are set to a private network or host only network depending on your virtual machine.
o This ensures the traffic never leaves your laptop
Metasploitable will be referred to as the target
Document the IP addresses of each system
o Kali - ________________________
o Metasploitable - ______________________
Only run these commands against your target machine metasploitable!
Use NMAP Commands from the presentation to complete the lab
Tasks
Perform and document the steps outlined below
Use the technical documentation examples as inspiration for formatting of
the lab document
Reflection should be at least one page long
Linux Operating System Questions
1. Run the following commands in terminal, research and explain the command and output of the command. If the command does not work by itself figure out the proper switches and usage. Reference man pages or the internet!
Tip: Use a table keep this organizedb. ls
c. mkdir
cd
pwd
cp
rm
rmdir
clear
less
man
wget
vi
cat
uname
ifconfig
ping
trace route
ps
netstat
echo
locate
whoami
dig
cut
sort
>
bb. |
2.How do you create a file?
3.How can you view the contents of a file in the linux terminal?
4.How can you create a directory?
5.What user are you logged in with?
6.What is your IP address?
7.What version of linux are you running?
8.Why would you use | ?
9.Why would you use > ?
10.How do you check permissions on a file or directory?
a. Explain the different types of permissions 11. What benefits do you see in using Linux over other operating systems?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
