logo

Penetration Testing and the Boot to Root Challenge

Perform a Penetration Test and write a report (70%) and Complete a Boot-2-Root challenge (30%)

21 Pages1324 Words243 Views
   

Added on  2022-11-14

About This Document

This report explains the vulnerabilities and their exploitation through penetration testing and the boot to root challenge. It covers the testing methodology, reconnaissance, scanning, exploitation, post-exploitation, and reporting. The report also includes a risk assessment criteria and a risk matrix. The Boot 2 Root Challenge section includes six flags that need to be obtained. The report is useful for understanding the vulnerabilities and their impact on the IT organization system.

Penetration Testing and the Boot to Root Challenge

Perform a Penetration Test and write a report (70%) and Complete a Boot-2-Root challenge (30%)

   Added on 2022-11-14

ShareRelated Documents
Penetration testing and the boot to root
challenge-
Penetration Testing and the Boot to Root Challenge_1
Table of Contents
Penetration testing and the boot to root challenge-....................................................................1
Executive summary-...................................................................................................................3
Scope –.......................................................................................................................................4
Penetration testing......................................................................................................................5
Testing methodology-................................................................................................................5
Reconnaissance-.....................................................................................................................5
Scanning-................................................................................................................................5
Exploitation-...........................................................................................................................8
Post exploitation-...................................................................................................................9
Reporting-..............................................................................................................................9
Finding summary-....................................................................................................................10
Risk Assessment Criteria-....................................................................................................11
Risk matrix-..........................................................................................................................12
Conclusion-..............................................................................................................................17
BOOT 2 ROOT CHALLENGE-..............................................................................................18
Flag first-..................................................................................................................................18
Flag second-.............................................................................................................................18
Flag third-.................................................................................................................................19
Flag fourth-...............................................................................................................................19
Flag fifth-.................................................................................................................................20
Flag sixth-.................................................................................................................................20
References-...............................................................................................................................21
Penetration Testing and the Boot to Root Challenge_2
Executive summary-
The principle motivation behind this report is to exhibit vulnerabilities and their abuse
through infiltration test and relieve unapproved assault to ensure our IT organization
framework. This appraisal was worked by Bikalpa Sharma with the assistance of VPN
condition on framework.
To start with, I have arranged root kali with VPN and run TAFE-kali by means of secure
attachment shell for example SSH student@10.220.0.0/24. In this procedure, Nmap is
utilized as a security scanner which gives data of adaptation of OS, ports, application and
administrations from target address. We have filtered the system through NESSUS in which
we can get the data of vulnerabilities. These vulnerabilities are classifications into basic, high,
medium, low and information. Abuse is propelled to the various sorts of vulnerabilities
through Metasploit that endeavours the area of vulnerabilities with their range.
This penetration test causes me to decide the sorts of vulnerabilities with hazard effect of
basic, high, medium, okay effect. This report demonstrates 8 sorts of vulnerabilities for
example 4 from basic risk, 1 from high chance of the risk, 2 from medium risk and 1 from
generally safe.
Penetration Testing and the Boot to Root Challenge_3
Scope –
In this assignment, the principle motivation behind this evaluation is to play out an entrance
test and assess various kinds of potential vulnerabilities sorted under network hazard level. A
few dangers related with vulnerabilities can cause enormous loss of information or private
data, framework slammed, etc. To relieve conceivable dangers on framework, various kinds
of arrangement, for example, stock potential vulnerabilities and others should use to verify
organize framework.
We also have to follow the table given below:-
Hostname Comment
VPN-KALI Run the exploitation
Sploit Performing the penetration testing
Red Performing the boot to root process
Penetration Testing and the Boot to Root Challenge_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Kali Linux Assignment Solved
|30
|3258
|95

Network and Security : Assignment (Doc)
|17
|2434
|25

Metasploit Framework Assignment PDF
|26
|1193
|325

Analysis of Security Vulnerability of WidgetsInc Virtual Machine Image
|23
|3636
|97