I dont know how to handle this Linux question and need guidance.
Project: Threat and Vulnerability Analysis, Incident Response, and Security Design 20 points. Students will be required to install VirtualBox (or VM Player) onto either a classroom PC or their own PC (note: no support is provided if students are using their own PCs, and students are encouraged to work out their own problems anyway even if using the classroom PC). Students will then work either independently or as a team of no more than 2 individuals to select standing up 2 operating systems as prescribed by the instructor, including Metaspolitable (a vulnerable server you will scan to find vulnerabilities). At the end of the semester, you or your team will complete network discovery (NMAP), complete vulnerability scan (Nessus), and prove penetration of 1 of your virtual machines (Metasploit). Your project will be graded as follows:
Scanning Project Scoring Criteria
Points
Downloaded VirtualBox or VM Player and installed Windows Server OS and Client OS (Windows or Linux) Setup Environment for internal network
1 4 points
Identified target system through network discovery using NMAP and/or other tools (e.g. Angry IP Scanner). Illustrated method for profiling.
1 4 points
Installed and successfully ran Nessus Identify vulnerabilities
1 4 points
Installed and successfully ran Metasploit (or equivalent) Demonstrating penetration into machine.
1 4 points
3 4 -page Project Report (lessons-learned and identify how you can maintain access)
1 4 points
The post ITN 261 Network Attacks, Computer Crime, and Hacking appeared first on Learnedprofessors.