White Hat Hacking: Scanning, SSH Attack, and Proxy Implementation
VerifiedAdded on 2021/04/21
|19
|1309
|493
AI Summary
The assignment details a scenario where an employee is suspected of leaking company information and an investigation is conducted to monitor their activities and computer usage. The task involves scanning the network using NMAP, identifying the target system, conducting a brute-force attack to obtain SSH credentials, creating a backdoor using Python and Paramiko, and configuring a proxy server using SquidGuard. This document provides a comprehensive guide to white hat hacking techniques and tools, suitable for students of computer science.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.