Question: THIS IS ALL USING INFOSEC. Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this
![THIS IS ALL USING INFOSEC. Tasks: 1. [5 points] Successfully Log](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2024/09/66f320bac1110_65866f320ba34238.jpg)
THIS IS ALL USING INFOSEC.
Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this might take a while to load since this VM is slow. 2. [5 points] Successfully Log into the Windows Server VM [Screenshot showing you are logged in] 3. [10 points] Using the Windows Server VM, ping the Metasploitable VM (IP address 192.168.1.30) [Screenshot showing you correctly used ping]. Based on the information you see from your ping, what value was used for Time To Live for the ping packets you created? 4. [10 points] Using the Windows Server VM, determine the IPv6 address for the Windows Server. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the IPv6 address you found? 5. [10 points] Using the Windows Server VM, determine the number of TCP Active Connections the Windows Server currently has. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the count of TCP Active Connections you determined? 6. [5 points] Using the Windows 10 VM, open up the protocol2.pcap file on the Desktop using Wireshark. [Screenshot showing the correct file open in Wireshark] 7. [5 points] Use Wirkshark's filter to show only ARP protocol packets located in the file from Task #6. [Screenshot showing the correct filter AND the filtered packets.] Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this might take a while to load since this VM is slow. 2. [5 points] Successfully Log into the Windows Server VM [Screenshot showing you are logged in] 3. [10 points] Using the Windows Server VM, ping the Metasploitable VM (IP address 192.168.1.30) [Screenshot showing you correctly used ping]. Based on the information you see from your ping, what value was used for Time To Live for the ping packets you created? 4. [10 points] Using the Windows Server VM, determine the IPv6 address for the Windows Server. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the IPv6 address you found? 5. [10 points] Using the Windows Server VM, determine the number of TCP Active Connections the Windows Server currently has. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the count of TCP Active Connections you determined? 6. [5 points] Using the Windows 10 VM, open up the protocol2.pcap file on the Desktop using Wireshark. [Screenshot showing the correct file open in Wireshark] 7. [5 points] Use Wirkshark's filter to show only ARP protocol packets located in the file from Task #6. [Screenshot showing the correct filter AND the filtered packets.]
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
