Difference: CisLab52014 (6 vs. 7)

Revision 72014-03-18 - JimSkon

Line: 1 to 1
META TOPICPARENT name="ComputerInformationSecurity2014"

Lab 5 - Introduction to penetration testing using Kali Linux


Line: 33 to 33
  1. How can Google be used to access someone's web cam?
  2. Google Hacking Database (GHDB) http://www.exploit-db.com/google-dorks/ . What is the point of this site? How can it be used?
  3. What is HTTrack? Use it to download at least two different websites.
  1. Fimap - Use it to look for vulnerabilities on you virtual machines (medispliotable, Windows 7, Windows 2008 Server). What did you find on each? (Kali Linux ( Tutorial Fimap Scan Website ),
  2. thc-ssl-dos - use it to attack medispliotable and Windows 2008 Server. Can you get to the system while it is being attacked? ONLY TARGET your own systems.
  3. Scapy - use scapy to generate at least 6 of the packets shown. Capture the output with WireShark , and confirm it's operation.

Step 3 - Web Vulnerability assessment

This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback