Document 1
Document 1
Configurations
NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.
• RAM: Use the RAM size of your choice based on the amount of RAM you
have on your laptop/desktop
• Hard Drive: A minimum of 50GB HDD.
On SRV:
c. TCP/IP settings:
• IP Address: 192.168.10.1
• Subnet Mask: 255.255.255.0
• DNS Server address: 192.168.10.1
On Kali:
• IP Address: 192.168.10.2
• Subnet Mask: 255.255.255.0
Question 2 28 Marks
Performing Reconnaissance &
Analysing Data with Wireshark
NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.
You want to see how attackers can execute a reconnaissance attack. You
will scan the network and hosts to see the kind of intelligence an attacker
can gain.
2.1 Install Wireshark on Windows Server and start capturing packets.
2.2 On Kali Linux, use Nmap to perform the following scans:
a. Run a ping scan against the local network (192.168.10.0/24).
Question 3 22 Marks
SSH Hacking
NOTE: Ensure you take screenshots of all your configurations and put
them in one final document.
On SRV:
3.3 Use ncrack to perform a password cracking attack against the SSH
server using a pre-generated password dictionary. The password
dictionary is called top50000.pwd and it is located in the /usr/share/ncrack
directory.
Question 4
Vulnerability Scanning
4.1 Install and activate Nessus Essential. Use your email address to get
the one-time activation key.
4.2 Create a new policy called “First Scan”.
4.4 Analyse the scan results. What are the vulnerabilities detected from
the scan and how would you remediate them?