Outcomes addressed in this activity: Unit Outcomes: Outline the steps of the inf

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Outcomes addressed in this activity:
Unit Outcomes:
Outline the steps of the inf

Outcomes addressed in this activity:
Unit Outcomes:
Outline the steps of the information gathering process.
Describe common social engineering techniques.
Describe common information, networking, and physical security attacks.
Use appropriate reconnaissance tools and techniques.
Course Outcome:
IT542-1: Analyze the methods ethical hackers use to perform reconnaissance and social engineering.
Purpose
In the first part of the lab, you will perform reconnaissance from the wide area network. The purpose of this lab is to show you how you can use Nmap to identify open ports and Netcat and telnet for banner grabbing. You will then learn how to use an exploit framework like Metasploit® to get access to the password file and use a password cracking tool like John the Ripper® to crack the password, and then login using admin access. In the second part of the lab you will use Kali Linux to scan a local area network and then use Metasploit and Armitage to exploit vulnerabilities.
Lab Instructions
Part 1:
Complete the labs “Performing Reconnaissance from the WAN” and “Scanning the network on the LAN.” In the lab environment, you will find step-by-step instructions. As you work through the labs, there will be capture-the-flag challenges.
Lab Requirements
Prepare the written portion into a Microsoft Word document. Support any assertions made with credible sources using APA style formatting.
For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.
Also review the university policy on plagiarism. If you have any questions, please contact your professor.
Plagiarism
Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.
www.lab.infoseclearning.com/course/GQZVVNPJGR/lab/SQFAQLDIBL?check_logged_in=1 
www.lab.infoseclearning.com/course/GQZVVNPJGR/lab/UWUENTBWQA?check_logged_in=1
Or Logged in the school website: www.purdueglobal.brightspace.com/d2l/loginh/
Username: DonaldNkamdjeu
Password: HomeworkDue!4

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now