Applied Exploitation Using Metasploit
While the scope of this class does not cover writing our own exploits, there are many libraries of exploits available to the security practitioner. One such library is Exploit Database, from Offensive Security. Metasploit is an exploit framework that provides access to the Exploit Database.
- Using GCU Approved Virtualization Solution and Metasploit available in Kali Linux, exploit three or more vulnerabilities discovered in the Vulnerability Assessment assignment on the virtual machines.
- Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Report.
- Append this assignment to the PEN testing report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan + Vulnerability Assessment + Applied Exploitation using Metasploit).
In a 500- to 750-word essay research the following concepts/terms. Discuss how these concepts/terms aid in the exploitation of a host system.
- Return-oriented programming
- Buffer overflows
- Password weaknesses
- Vulnerability Race conditions
- Numeric over/underflows
- User-space vs. Kernel-space vulnerabilities
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Custom Payload
Metasploit comes with various preconfigured backdoors and payloads both for Windows and Linux Operating Systems. These backdoors can be used to exploit flaws discovered in the source code of a host. Metasploit also comes with an additional tool set that allows the security practitioner to create custom backdoors (payloads) to be delivered by Metasploit. These custom payloads can be used to evade Anti-Virus (AV) protection and established trust relationships between information systems.
- Using GCU Approved Virtualization Solution and MSFVenom (MSFPayload + MSFEncode) available in Metasploit Frameworks, found in Kali Linux, create a custom payload and install that payload as a backdoor in an exploited host and establish a remote access connection verses a local login.
- Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Reports.
- Append this assignment to the PEN testing report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan + Vulnerability Assessment + Applied Exploitation using Metasploit + Custom Payload).
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Topic 4 DQ 1
Exploits are written to take advantage of vulnerabilities in a host. What are the legal and ethical issues of using exploits as a cybersecurity professional? Does this cross the legal line? What are the benefits?
Topic 4 DQ 2
Metasploit is one exploit framework. Research other exploit frameworks, and compare and contrast these frameworks. Select one that you would choose to implement and defend your selection.
Place your order now on a similar assignment and get fast, cheap and best quality work written by our expert level assignment writers.
Solved Questions:
SOLVED! Describe the difference between a nursing practice
SOLVED! Case C 38-year-old Native American pregnant
ANSWERED!! Watch the Diary of Medical Mission Trip