Penetration testing help
Need help with penetration testing. VMware software needed but download links included.
3 months ago
75
assignment_questionnaire.txt
- project1writeup-2.docx
assignment_questionnaire.txt
Assignment Questionnaire ======================== NOTE: DO NOT DELETE --> and <--, and place your answers within the marks. Example: --> 130.207.7.210 <-- Info ==== --> Your Login ID: zclarke6 Your Name: Z. Clarke <-- Task 1 ======= 1. What is the IP address of the vulnerable VM on the NAT network? Example: IP : 10.0.2.3 --> IP : <-- 2. Which port receives http traffic on the vulnerable VM. Example: Port : 73 --> Port : <-- Task 2 ======= 1. What command did you use to exploit the shellshock vulnerability? Example: Command : curl http://10.0.2.1:6262/cgi-bin/shellshock.cgi --> Command : <-- 2. What hash value is returned by running ./bin/task2 with your login ID. --> Hash : <-- Task 3 ======= 1. Give the full name of the exploit module you used. Example: Module : auxiliary/scanner/portscan/tcp --> Module : <-- 2. Give the full name of the payload you used: Example: Payload : auxiliary/scanner/portscan/tcp --> Payload : <-- 3. What hash value is returned by running ./bin/task3 with your login ID. --> Hash : <-- Task 4 ======= 1. What command did you use to find the program with the vulnerable setUID bit (assume the command is being rurn from the /usr/bin directory). Example: Command : find . php --> Command : <-- 2. Give the name of the vulnerable program in /usr/bin. Example: Program : passwd --> Program : <-- 3. What command did you use to exploit the setUID vulnerability to spawn a shell. --> Command : <-- 4. What hash value is returned by running ./bin/task4 with your login ID. --> Hash : <-- Task 5 ======= 1. Give the John the Ripper command you used to find the password of task51.zip. --> Command : <-- 2. What is the password for task51.zip. Example: Password : 1234 --> Password : <-- 3. What hash value is returned by running python task51.pyc with your login ID. --> Hash : <-- 4. Give the cewl command you used to create your wordlist. --> Command : <-- 5. Give the John the Ripper command you used to find the password of task52.pyc.gpg. --> Command : <-- 6. What is the password for task52.pyc.gpg. --> Password : <-- 7. What hash value is returned by running python task52.pyc with your login ID. --> Hash : <--
- CJA304 - Week 2 Paper
- Kim woods only 5
- Stat
- Prpare a 2015 Form 1120 US corporation Income Tax Return
- finance essay, so easy! just 2 pages!
- DR.SAMUELSON
- Assignment 2: External Environmental Scan
- Business........READ FULL DESCRIPTION...........MUST BE DONE IN 5 HOURS
- ENG/223(AAID1LEX1)
- MGMT315 Marketing Campaign