cs393lab4

Cs393lab4 - CS 393 Lab 4 Zhou HuanXian 0225418 NEWORK SECURITY LAB 4 Host Exploitation 1.0 Objective In real world networks are often compromised

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 393 Lab 4 Zhou, HuanXian 0225418 - NEWORK SECURITY - LAB 4 Host Exploitation 1.0 Objective In real world networks are often compromised using vulnerabilities in the software and services that they host. This also happens to be one of the easiest ways to gain access given the easy availability of exploits and frameworks that are used to quickly build one. The aim of this exercise is to gain understanding of basic exploitation techniques used by hackers & pen-testers alike and understand the post-exploitation possibilities. Using the single ip address on which you performed reconnaissance in lab three we are now going to exploit the host using the information which we gathered. Again the target should be within the ip address range of 10.194.3.0 - 254 in the ISIS lab. DO NOT TARGET ANYTHING OUTSIDE OF THIS IP ADDRESS RANGE. IN ADDITION, THIS EXERCISE MUST BE PERFORMED WITHIN THE CONFINES OF THE ISIS LAB. 1.1 Exploit Discovered Hosts
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2010 for the course CS 393 taught by Professor Staff during the Spring '08 term at NYU Poly.

Page1 / 5

Cs393lab4 - CS 393 Lab 4 Zhou HuanXian 0225418 NEWORK SECURITY LAB 4 Host Exploitation 1.0 Objective In real world networks are often compromised

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online