Question: THIS IS ALL USING INFOSEC. Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this

 THIS IS ALL USING INFOSEC. Tasks: 1. [5 points] Successfully Log

THIS IS ALL USING INFOSEC.

Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this might take a while to load since this VM is slow. 2. [5 points] Successfully Log into the Windows Server VM [Screenshot showing you are logged in] 3. [10 points] Using the Windows Server VM, ping the Metasploitable VM (IP address 192.168.1.30) [Screenshot showing you correctly used ping]. Based on the information you see from your ping, what value was used for Time To Live for the ping packets you created? 4. [10 points] Using the Windows Server VM, determine the IPv6 address for the Windows Server. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the IPv6 address you found? 5. [10 points] Using the Windows Server VM, determine the number of TCP Active Connections the Windows Server currently has. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the count of TCP Active Connections you determined? 6. [5 points] Using the Windows 10 VM, open up the protocol2.pcap file on the Desktop using Wireshark. [Screenshot showing the correct file open in Wireshark] 7. [5 points] Use Wirkshark's filter to show only ARP protocol packets located in the file from Task #6. [Screenshot showing the correct filter AND the filtered packets.] Tasks: 1. [5 points] Successfully Log into the Metasploitable VM [Screenshot showing you are logged in] -- Note that this might take a while to load since this VM is slow. 2. [5 points] Successfully Log into the Windows Server VM [Screenshot showing you are logged in] 3. [10 points] Using the Windows Server VM, ping the Metasploitable VM (IP address 192.168.1.30) [Screenshot showing you correctly used ping]. Based on the information you see from your ping, what value was used for Time To Live for the ping packets you created? 4. [10 points] Using the Windows Server VM, determine the IPv6 address for the Windows Server. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the IPv6 address you found? 5. [10 points] Using the Windows Server VM, determine the number of TCP Active Connections the Windows Server currently has. [Screenshot showing you using a correct tool to find this information and the information requested.] What is the count of TCP Active Connections you determined? 6. [5 points] Using the Windows 10 VM, open up the protocol2.pcap file on the Desktop using Wireshark. [Screenshot showing the correct file open in Wireshark] 7. [5 points] Use Wirkshark's filter to show only ARP protocol packets located in the file from Task #6. [Screenshot showing the correct filter AND the filtered packets.]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!