Virtualization creates a safe sandbox for you to experiment with the various security tools that will be utilized within the course.

Using VirtualBox or similar desktop virtualization software, create an out of band PEN testing environment that will include an attack platform and numerous target operating systems.

Download a Kali ISO. Refer to the Kali Linux website located within the course materials.

Install Kali Linux in a new virtual machine (use default settings).

Select at least two vulnerable target operation systems from the Vulnhub website located within the course materials.

  1. Suggest OSs; Metasploitable 1 and Metasploitable 2
  2. Windows XP Service Pack 0 and Windows 7 Service Pack 0

All virtual machines should be configured on an isolated subnet in VirtualBox, or similar desktop virtualization software settings.

As you go, take instructional notes and screenshots that will help to reproduce your process.

Document the installation process in the “Lab Report Template.” Include individual IP addresses and Host names for each virtual machine.

http://www.vulnhub.com

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!