logo

Ethical Hacking: Methodology, Tools and Penetration Testing

   

Added on  2023-06-13

17 Pages1703 Words348 Views
Table of Contents
1. Introduction.................................................................................................................................2
2. Scanning.......................................................................................................................................2
Findings................................................................................................................................................3
3. Penetrating the Desktop............................................................................................................10
4. Cracking the passwords............................................................................................................11
5. Conclusion..................................................................................................................................11
6. References..................................................................................................................................12
1

1. Introduction
Scope of ethcal hacking will be investigated. Ethical issues will be studied and the legal
issues will be discussed. Methodology and the penetrating tools will be studied and
investaigated. One system penetration test will be done in a virtual machine. The weeknesses
of the virtual machine will be investigated. Penetration tests will be done. Suitable counter
measures will be investigated.
2. VM Scanning
2

Do the necessary technical tasks and opened the VM in virtual box. VM Workstation was slow.
Got the VM working
3

Got the IP address of the VM
Opened settings. Selected setwork settings. IT address of the VM is noted down. This VM can be
accessed using this IP address now. The vm can be accessed in remote mode too. Direct console
access also possible,
Opened IFCONFIG command in terminal. Noted down the IP. Ips are matching.
NAT option is selected so that the IP address can communicate with the external world.
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Firewall Rules for Network Security: Accessing, Mitigating Virus Attack, VPN Access, VLAN Access, Blocking RFC 1918
|10
|922
|63

Penetration Testing and Intrusion Detection Name of the University Author
|57
|5094
|316

Design and Implementation of a Secure Server Network for GAMMA Enterprise, UK
|5
|1175
|351

Simulation of Hierarchical Network Design Model using Cisco Packet Tracer
|17
|1921
|277

CyberSecurity Technical Report: Findings, Analysis and Recommendations
|24
|2693
|115

Ethical Hacking & Countermeasures Report 2022
|25
|3747
|46