Full width home advertisement

Post Page Advertisement [Top]

Hello sorry for the long post but my brother asked if i could put a post out here to see if anyone knows how to do this Project or really where he could find a good tutorial that can teach him how this works and how to do it. His professors told him off and wont help him at all, he's trying to get it himself. I've tried to help him but I don't work with this stuff much as I'm studying a different field in tech but have been trying my best to help him. Below is the project and what they want him to do, also any recommendations on what software to use?

"This project will test your ability to ethically hack into a target system. You may use all of your accumulated knowledge and ability to compromise the target and locate useful information on it. You will also create a document that illustrates your tools, techniques, approaches, exploits, and resulting data.

START THE SYSTEM HACKING TARGET VM Add the downloaded System Hacking Target virtual machine to VMware and start it. You will not log into the system. Instead, it will be the target of your ethical hacking work. TOOLS AND ATTACK VMS You may use any tools and new or pre-built Vms for this project. Helpful tools from this class, which may help on this project, include:

• Nmap

• OpenVAS

• Nikto

• BurpSuite

• ZAP

• Metasploit

• John the Ripper

• Hashcat

• Kali Linux

You may use any other tools. Be sure to document and explain all tools’ use. RECONNAISSANCE Perform reconnaissance to learn all you can about the target VM, without hacking into it. Summarize any services you feel may be exploitable, as well as information that helps to identify the type of system the target it running. System Hacking Project Page 1 of 3 FLAGS 11 flags have been dispersed through various locations in the target VM. They are clearly labeled, and you will recognize them when you encounter them. You must find 6 of the flags through your ethical hacking efforts. Each additional flag that you locate, over 6, will earn you an extra credit point on this project. Be sure to document each flag you find and where you locate it. Additionally, if the flag contains encrypted text, you must decode it to receive credit. EXPLOITS Successfully perform 5 separate exploits to gain access to the target system. You need to document the process you used for each exploit – your thought process, the tools you used, the results you saw. PASSWORD COMPROMISE After successfully exploiting the target, obtain the password hashes for the following users.

• klog

• msfadmin

• postgres

• root

• service

• sys

• user

Once those password hashes are obtained, crack them and identify each of the compromised user’s passwords. For extra credit, identify the MySQL database service root user’s password."

Again thank you all for taking the time to even read this and we arent looking for someone to do this ourselves we are just lost on what needs to be done and we can't really find anything to help us and was wondering if anyone else has anything we can watch, read, etc. submitted by /u/clone10001
[link] [comments]


http://dlvr.it/T6SMzx

No comments:

Post a Comment

'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();

Bottom Ad [Post Page]

| Designed by Colorlib