logo

Ethical Hacking and Defense: Case Study Analysis

   

Added on  2023-06-05

11 Pages2129 Words440 Views
 | 
 | 
 | 
Ethical Hacking and Defense
Ethical Hacking and Defense: Case Study Analysis_1

Executive Summary
This project is used to create the report for ethical hacking and defence with the given
case study. Here, user requires to penetrate the given system and achieve the root level
privileges. Generally, this project is divided into five flags. These flags are used to provide
the effective ethical and hacking defence information in detail. These five flags are needs to
analysed and discussed in detail. Each flag needs to identify and determine the user and
admin credential information. Also, crack the password by using the password cracking tool
and determine the TCP port by using the TCP port scanner tool.
Ethical Hacking and Defense: Case Study Analysis_2

Table of Contents
1 Project Description...........................................................................................................3
2 Defined methodology and Log Testing...........................................................................3
Flag 1- Web Server...............................................................................................................4
Flag 2- Web Shells................................................................................................................4
Flag 3- Crack Password.......................................................................................................6
Flag 4- TCP port scanner – NMAP....................................................................................7
Flag 5- Privilege....................................................................................................................9
3 Result..................................................................................................................................9
4 References........................................................................................................................10
Ethical Hacking and Defense: Case Study Analysis_3

1 Project Description
Main objective of this project is to make the report for ethical hacking and defence with
the given case study. The area cover in this report includes as follows- The user requires to
penetrate the given system and achieve the root level privileges. Generally, this project is
divided into five flags, where the first flag needs to examine the content of the web server, to
determine the username and password for the admin. The flag is required to know about the
web shells. The third flagsrequires to crack the password. The fourth flags requires
determining the user entered the wrong password on the system, where the TCP port scanner
is used. The fifth flag is required to learn the basic escalation of Linux privilege. It also
defines the methodology and testing of the log.
2 Defined methodology and LogTesting
Here, the user quires to install the Virtual machine and also installs the provided case
study on the virtual machine. This process is demonstrated below("An Introduction to Web-
shells | Acunetix", 2018).
Ethical Hacking and Defense: Case Study Analysis_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents