hello, I need someone that can help me run this penetration t. I need someone that can walk me through while I am sharing the screen. I need help right now up to 7:30 pm central time usa
Please read the instruction carefully. from
: Provide screenshots and submit them in one PDF file.
Task #1: Information Gathering (5pt)
: Find out a “pptx” document that has a title that begins with “Upping the Ante” from www.umkc.edu using search operators.
1) Provide a screenshot of the page. 1 of the pptx file, which includes the name of the author of this file (Cyn…, Ph.D).
Task #2: Scanning (10pt)
: Metasploitable is running the Apache Tomcat server.
1) Provide the screenshot of the Nmap scanning result that shows the Apache Tomcat server running at the OS with the port number.
2) Open the Firefox browser from Kali and visit Metasploitable’s Apache Tomcat server by providing IP address and the port number (e.g. 10.0.2.20:1010). Provide a screenshot of the webpage.
Task #3: Exploitation (10pt)
Use Metasploit Framework from Kali to get into Metasploitable OS.
: Choose only one option to finish task #3
Option #1)
1) Find out a port number of “vsftp” service using Nmap scan. Provide a screenshot.
2) Do “search vsftpd” and get into the system (exploitation) and show your current directory inside of the Metaploitable (by “pwd” command) by screenshot.
Option #2)
1) Find out a port number of “distcc” service using Nmap scan. Provide a screenshot.
2) Do “search distcc_exec” and get into the system (exploitation) and show your current directory inside of the Metaploitable (by “pwd” command) by screenshot.
Task #4: Post exploitation (5pt)
: Backdoor is open at 1524 port of the Metasploitable
1) Use Netcat to connect to the port and upload IT429.txt


0 comments