Question: Overview One machine will act as the attacker machine one machine will be the victim machine. Requirements The lab prep lab (Lab 0) must have

Overview

One machine will act as the attacker machine one machine will be the victim machine.

Requirements

The lab prep lab (Lab 0) must have been completed before proceeding

Ensure both network adapters on Kali and the Metasploitable virtual

machines are set to a private network or host only network depending on your virtual machine.

o This ensures the traffic never leaves your laptop

Metasploitable will be referred to as the target

Document the IP addresses of each system

o Kali - ________________________

o Metasploitable - ______________________

Only run these commands against your target machine metasploitable!

Use NMAP Commands from the presentation to complete the lab

Tasks

Perform and document the steps outlined below

Use the technical documentation examples as inspiration for formatting of

the lab document

Reflection should be at least one page long

Linux Operating System Questions

1. Run the following commands in terminal, research and explain the command and output of the command. If the command does not work by itself figure out the proper switches and usage. Reference man pages or the internet!

Tip: Use a table keep this organizedb. ls

c. mkdir

cd

pwd

cp

rm

rmdir

clear

less

man

wget

vi

cat

uname

ifconfig

ping

trace route

ps

netstat

echo

locate

whoami

dig

cut

sort

>

bb. |

2.How do you create a file?

3.How can you view the contents of a file in the linux terminal?

4.How can you create a directory?

5.What user are you logged in with?

6.What is your IP address?

7.What version of linux are you running?

8.Why would you use | ?

9.Why would you use > ?

10.How do you check permissions on a file or directory?

a. Explain the different types of permissions 11. What benefits do you see in using Linux over other operating systems?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!