Question: Please complete and post the screenshots here. I can be reached at practicals.lab at G mail as I won't be able to comment, or explain

 Please complete and post the screenshots here. I can be reached

Please complete and post the screenshots here. I can be reached at practicals.lab at G mail as I won't be able to comment, or explain here because this platform does not provide end users that access.

PYTHON PROGRAMMING DEFENSIVE SCRIPTING Preconditions: - VM Environment - Two Host Systems: Windows 10 Professional and Kali Linux. - VM Environment - Two Target Systems: Windows 7 and Metasploitable (Linux). - The internet available. - Python installed. Task 1: Write a python script (code) and launch it from the HOST: Windows 10 Professional (VM) to discover and remedy as many vulnerabilities as possible on TARGET: Windows 7 system (VM). In addition to the pip-audit tool, use three additional compatible open-source tools to load into the VM environment from host systems to target systems to identify vulnerabilities and remediate the vulnerabilities found. Briefly explain the specific purpose of the three additional compatible open-source tools, packages, etc. you have chosen beyond the basic python used to launch python script from the host system to the target that will identify and remedy vulnerabilities. Task 2: Write a python script (code) and launch it from the HOST: Kali Linux (VM)to discover and remedy as many vulnerabilities as possible on TARGET: Metasploitable system (VM). In addition to the pip-audit tool, use three additional compatible open-source tools to load into the VM environment from host systems to target systems to identify vulnerabilities and remediate the vuinerabilities found. Briefly explain the specific purpose of the three additional compatible open-source tools, packages, etc. you have chosen beyond the basic python used to launch python script from the host system to the target that will identify and remedy vulnerabilities. Outcomes 1. Screenshots of both written scripts. 2. Both target systems must be scanned and remediated. 3. Screenshots of vulnerabilities and remediations. 4. Host systems must be used to launch scans and follow-on activities remediation. 5. Identify what tasks will be done with Python scripts. 6. A description of all THREE tools, packages, etc., beyond basic Python, used to complete the tasks

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!