Assessment: Email Spoofing (Kali Linux + Metasploitable2)
Lab Safety & Ethics Reminder:Only perform email spoofing in a controlled lab environment. Sending spoofed emails on public networks is […]
Description.
Lab Safety & Ethics Reminder:Only perform email spoofing in a controlled lab environment. Sending spoofed emails on public networks is […]
Reminder on Lab Safety/Ethics: Only test DVWA/Juice Shop in your VM lab. Never attack real websites. Students must perform the
Lab Safety Reminder:Only capture traffic on your own network or lab VMs. Capturing traffic on public networks without permission is
Payload Generation (Windows & Android) Generate a Windows .exe reverse shell payload using msfvenom. Generate an Android .apk reverse shell
Practical Tasks Create a folder named assessment_lab in your home directory and move into it. Inside assessment_lab, create three empty
Task 1 – FTP Brute Force Create small user and password lists. Run Hydra against FTP service on Metasploitable (192.168.56.101).
Task 1 – Dictionary Attack Create a small file named labhashes.txt containing MD5 hashes of at least 3 known passwords
Perform the following tasks in your lab environment and attach screenshots as proof. Perform a dictionary attack against the SSH
Task 1 – Nano Create a file named student_notes.txt using Nano. Write 5 lines of text inside the file. Delete
Practical Exercises In this assignment, you will perform hands-on exercises with Nmap to reinforce your understanding of host discovery and