We are going to use Metasploit on Kali to exploit the vulnerable Metasploitable machine. Perform a port scanning from Kali to remember what services are running on what ports on Metasploitable2 VM. Take screenshots of your code snippets and important results and explain what you observe as you go through the lab. Exploiting vulnerability in MYSQL server…
Category: cybersecurity
CyberSecurity Lab – Online Password Attack
Part 1: Online Password Attack In this section, you will launch attacks over the network against login services, in an attempt to brute-force a username/password. This attack uses all unique passwords from the 32 million RockYou password breach. If the file /usr/share/wordlists/rockyou.txt is not present on the VM, unzip the password list. gunzip /usr/share/wordlists/rockyou.txt.gz You…
Cybersecurity Lab – Sniffing and Spoofing
Please download and unzip Lab setup files in your SEED VM: Labsetup.zip Navigate to the folder containing the docker-compser.yml file and run the following command: docker-compose up -d to setup these machines: All the codes needed in the following tasks are provided in the volumes folder in the Lab setup folder. All attacks are done…