Kali Linux Assignment Solved

Added on - 31 May 2021

  • 30

    Pages

  • 3258

    Words

  • 14

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 6 of 30 pages
Table of Contents1. Executive Summary.....................................................................................................................22. Scope...........................................................................................................................................23. Testing Methodologies...............................................................................................................33.1Reconnaissance.................................................................................................................33.2Scanning............................................................................................................................43.3Exploitation.......................................................................................................................63.4Post-Exploitation...............................................................................................................63.5Clearing tracks/reporting..................................................................................................64.Findings Summary...................................................................................................................65.Risk Assessment Criteria.........................................................................................................76.Penetration Test Findings........................................................................................................76.1 High Risk Findings...................................................................................................................157. Boot 2 Root challenge...............................................................................................................15Vulnerability analysis....................................................................................................................248. Exploit attack against target address.......................................................................................269. Conclusion.................................................................................................................................27References.....................................................................................................................................281
1. Executive SummaryGenerally the kali Linux is used to the testing such as penetration testing. The penetrationtesting has three types. They are white box testing, black box testing and gray box testing. For ehpenetration testing the kali Linux and other kind of tools are used. The intelligence of network isfound using the target system. And this target is used to collect the information. The targetidentification is essential for provide the details about the customer. Using this data we can obvioussearch out the great flow to approach the important outputs. Reconnaissance resources are alsoknown as detail collecting process done by kali Linux. The major goal of reconnaissance is useapplications and services, acknowledge the types of system, social engineering information, and alsodocument information. We know that, in kali Linux we are using several tools and these types oftools are also known as vulnerability analysis. The assessment objectives are done the belowresources, such as asses the target system vulnerability, priority of vulnerable system, mapping thevulnerable system, and problem discovery.2. ScopeThe net server is analyzed by using kali Linux. Net server is known as the main server and itcontains the services and this is used to the products. And these kind of server is used as theframework. And this server appear like generic server and also it includes the single connectionserver. We need to study the important objectives for analyze the net server. So in this situation weare using the penetration testing. The major for using this system is the weak points of the system iseasily recognized. After the penetration analysis is completed by using the kali Linux, and then weneed to perform the Boot to Root activity. The target range is known as 10.222.0.251 and10.222.0.252.2
3. Testing Methodologies3.1ReconnaissanceReconnaissance phase is define at tester gather original and possible information and attackaimed systems or applications. Target range of reconnaissance is under third parties. Tester use forreconnaissance test classified in two types, passive and active. Active reconnaissance is not invisibleinteract can be straightly conversation is liked. Invisible interact means not straight conversation.Passive reconnaissance capture all details and without face to face communication with aimedsystems.3
3.2ScanningScanning means tester can check previously all data and vulnerabilities, worth able files ordocumentation. Is called sample attack. Scanners followed many tools for finished the work. Alsofind the target place and use some tools, to use open the ports on current systems. Scanningprocess in detect any weakness that be explained at entire network access. Managing the all toolsand fixed suitably tool at types of weakness system, important role of scanning.In this process the security test was carried out to check whether the system have any flaws.So the checking of the flaws in the system was known as scanning. Here we check the confidentialityof the system. Also the authentication system undergoes to the test. In this stage any weaker areaof the network system was identified.4
5
3.3ExploitationTo find first system weakness, after catch many weakness to cross the over rule in thesecurity. To get many workstation and application for exploitation work freely available. Theyimportant tools used for exploitation work and get result as fast, core impact, canvas, databasemap, nets parker.3.4Post-ExploitationThis methodology refer to relative automation value is calculated by the worth full of thedatabase system. It also helped to classify the machine extra exploiting works. Post exploitationcheck the follow infrastructure as, configuration network, interfaces. Find track the any applicationor bugs. Easily extend the connectivity from one or more system. This techniques will establish thesome manageable works and to created legal way to access aimed networks.3.5Clearing tracks/reportingThe reported of penetration testing easy knowledge to understandable. This report help towhat kinds of work can makes in our system or client it systems usefully. Refer to other person withtesting of methodology helped to this documentation. This testing used for no unwanted person orhackers not easily allowed for this testing. Which strongly at vulnerability parts all of place insystem. You want check to make hack with own entire systems. This reporting presented at variousways at, executive level and technical reporting.4.Findings SummaryIn the risks analysis the list of vulnerabilities are shown and the solution for thevulnerabilities are found, explained about the vulnerability result. And the attacks are shownusing the kali Linux and also the risks are analyzed by the range. And in that each risk has ownvalue and specified based on each criteria. And the penetration has implemented using the kaliLinux with VMware. And also the attacks are analyzed through the implementation.6
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document