IT 542 PUG Computer Science Remote and Local Exploitation Essay – Description
LAB INSTRUCTIONS
Part 1:
Complete the lab “Remote and local Exploitation.” In the lab environment, you will find step-by-step instructions. As you work through the lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture.
Part 2:
After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.
Why do you need to start Postgresql before starting Metasploit?
What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
Research and find a Metasploit exploit for Android® Describe the exploit and its various options. Discuss what a user can do to protect themselves from the exploit.
What is the difference between an /etc/shadow and an /etc/password file in Linux?
Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Which algorithm was used to hash the password?
What is the maximum number of days the password is valid?
What is the date that this account will expire?
The post IT 542 PUG Computer Science Remote and Local Exploitation Essay first appeared on .