logo

Ethical Hacking: Case Study on Infiltration and Root Level Privileges

   

Added on  2023-06-04

18 Pages2573 Words133 Views
Ethical Hacking

Executive Summary
Illegal hacking includes serious threats and vulnerabilities for the various organizations
around the world. To stop this, ethical hacking has evolved. The organizations are expected
to be protected with ethical hacking as it knows what the illegal hacker wishes or is desperate
to harm. The ethical hackers work on preventing the network or system of the organizations
and this is why they are hired. The following report talks on the case study related to ethical
hacking where, infiltration is needed for the system and the root level privileges must be
attained. Totally five flags are represented in this project and the whole project revolved
around these flags. The relative study will be on the webservers, web shell, password
cracking and TCP port scanning tool.

Table of Contents
1 Project Overview...............................................................................................................3
2 Defined methodology and Testing Log...........................................................................3
2.1 Flag 1) Web Server....................................................................................................4
2.2 Flag 2) Web Shells.....................................................................................................5
2.3 Flag 3) Password Cracker.........................................................................................7
2.4 Flag 4) TCP Port Scanner – NMAP.......................................................................13
2.5 Flag 5) Privilege.......................................................................................................15
3 Results and Recommendations......................................................................................15
References...............................................................................................................................17

1 Project Overview
Illegal hacking includes serious threats and vulnerabilities for the various organizations
around the world. To stop this, ethical hacking has evolved. Hacking is a crime and the
hacker can be penalized. The organizations are expected to be protected with ethical hacking
as these certified professionals know what the illegal hacker wishes or is desperate to harm.
The ethical hackers work on preventing the network or system of the organizations and this is
why they are hired. The following report talks on the case study related to ethical hacking
where, infiltration is needed for the system and the root level privileges must be attained.
Totally five flags are represented in this project and the whole project revolved around these
flags. The relative study will be on the webservers, web shell, password cracking and TCP
port scanning tool. The specific advantages and importance of webservers, web shell,
password cracking and TCP port scanning tool will be represented in this report.
2 Defined methodology and Testing Log
As demonstrated in the following screenshot, the beginning step of the user must have
virtual machine and its installation. The case study must be understood to carry out this
process.
The IP Address identification is represented in the following screenshot.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking: Case Study on Virtual Machine with Flags and Techniques
|21
|2782
|194

Ethical Hacking: Case Study on Virtual Machine with Flags, Web Server, Web Shells, Password Cracker, TCP Port Scanner and Privilege Escalation
|21
|2782
|157

Ethical Hacking Report: Penetration Testing and Techniques
|16
|3773
|437

Ethical Hacking and Defence: A Case Study
|19
|1954
|321

Ethical Hacking: Methodology, Testing Log, and Outcomes
|23
|3194
|165

Ethical Hacking and Defense: Case Study Analysis
|11
|2129
|440