IDS Evasion. 

  1. Complete Netlab 3 .NETLAB 3. A. IDS Evasion. 
    1. Initiating Network Monitoring Application
    2. Testing IDS results with Regular Nmap scan
    3. Testing IDS results with decoy scan
    4. Testing IDS results with Spoofed MAC Scan
    5. NETLAB 3. B. Password Cracking With John The Ripper and Hashcat. 
    6. Generating Password List for Password Cracking
    7. Create a User Account to be cracked.
    8. Password cracking Using John the Ripper
    9. Password Cracking Using Hashcat
    10. NETLAB 3. C. Metasploit Framework Fundamental & Armitage. 
      1. Getting familiar with Metasploit. Why do pen testers use Metasploit?
      2. Vulnerability scanning Using the WMAO Module.
      3. Configuring Exploits and Payloads.
      4. Finding and Execuritn Attacks in Armitage.
    11. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

 

  • attachment

    SAMPLESCREENSHOTofNETLAB3.pdf