lab4 - CS6823 - NEWORK SECURITY - LAB 4 Host Exploitation...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1.0 Objective In real world networks are often compromised using vulnerabilities in the software and services that they host. This also happens to be one of the easiest ways to gain access given the easy availability of exploits and frameworks that are used to quickly build one. The aim of this exercise is to gain understanding of basic exploitation techniques used by Using the single ip address on which you performed reconnaissance in lab three we are now going to exploit the host using the information which we gathered. Again the target should be within the ip address range of 10.194.3.0 - 254 in the ISIS lab. DO NOT TARGET ANYTHING OUTSIDE OF THIS IP ADDRESS RANGE. IN ADDITION, THIS EXERCISE MUST BE PERFORMED WITHIN THE CONFINES OF THE ISIS LAB. 1.1 Exploit Discovered Hosts To do this exercise, you’ll need to have a thorough understanding of the Metasploit Exploit Framework – this is a community project that is widely used in Infosec. The tool
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2010 for the course CS 393 taught by Professor Staff during the Spring '08 term at NYU Poly.

Page1 / 2

lab4 - CS6823 - NEWORK SECURITY - LAB 4 Host Exploitation...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online