{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

cs393lab4 - CS 393 Lab 4 Zhou HuanXian 0225418 NEWORK...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CS 393 Lab 4 Zhou, HuanXian 0225418 - NEWORK SECURITY - LAB 4 Host Exploitation 1.0 Objective In real world networks are often compromised using vulnerabilities in the software and services that they host. This also happens to be one of the easiest ways to gain access given the easy availability of exploits and frameworks that are used to quickly build one. The aim of this exercise is to gain understanding of basic exploitation techniques used by hackers & pen-testers alike and understand the post-exploitation possibilities. Using the single ip address on which you performed reconnaissance in lab three we are now going to exploit the host using the information which we gathered. Again the target should be within the ip address range of 10.194.3.0 - 254 in the ISIS lab. DO NOT TARGET ANYTHING OUTSIDE OF THIS IP ADDRESS RANGE. IN ADDITION, THIS EXERCISE MUST BE PERFORMED WITHIN THE CONFINES OF THE ISIS LAB. 1.1 Exploit Discovered Hosts To do this exercise, you’ll need to have a thorough understanding of the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}