• Home
  • Blog
  • Emerging Threats and Countermeasures

Emerging Threats and Countermeasures

0 comments

***Note***: No additional materials will be provided

1. You will need 2 Virtual Machines (VM)

On windows “disable the firewall and windows defender”

1: Replace the example IP with the Kali IP go to terminal >enter ifconfig.

2: Get the IP of the Windows OS. Run>CMD>ipconfig (it’s the IPv4)

3. Ping the Windows IP from Kali to test connection (ping <IP>)

Follow Directions

Provide screenshots of your process from the lab

– Screenshots must generate from your computer

– Screenshots must show the time in the bottom right screen (windows) or Mac top right corner.

2. Continuing from the WK 7 Research Paper, provide a short summary of the Kali tool you researched.

Explain how is it a threat, provide background information, how it is used, how you can defend against it (your opinions).

– Respond to two other students.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}