files.transtutors.com€¦  · web viewwhen completed, you will have one microsoft word document...

5
When completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat nmap_script.sh” so that I can see your script 2. Screen output of running script.sh Use the follow infoseclearning lab: Scanning the Network on the LAN. Keep in mind that you will be limited to 90 minutes per lab session and you will not be able to “copy and paste” your code – you could, however, take a screenshot of your code before the lab time expires. If you feel that you need more time to practice the lab script, you can download Kali Linux and use it. Keep in mind your nmap script will not be the same, so you would have to copy the script to the infoseclearning environment before submitting. LOCAL INSTALLATION USING VIRTUALIZATION SOFTWARE INSTRUCTIONS 1. Choose your virtualization software (either works fine and they are both free): o VirtualBox: o https://www.virtualbox.org/wiki/Downloads o VMware Workstation Player: o https://my.vmware.com/en/web/vmware/free#desktop_end_user_computing/ vmw are_workstation_player/14_0 2. Kali Linux can be downloaded from: o https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox- hyperv-image-download/ 3. Metasploitable can be downloaded from: o https://sourceforge.net/projects/metasploitable/files/Metasploitable2/ 4. If you need additional help installing Kali, please review Kali Linux Revealed for step-by-step instructions: o https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf INSTRUCTIONS

Upload: others

Post on 21-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: files.transtutors.com€¦  · Web viewWhen completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat

When completed, you will have one Microsoft Word document with two screenshots:1. script.sh (Note: This will be the output of running: “cat nmap_script.sh” so that I can see yourscript2. Screen output of running script.shUse the follow infoseclearning lab: Scanning the Network on the LAN. Keep in mind that youwill be limited to 90 minutes per lab session and you will not be able to “copy and paste”your code – you could, however, take a screenshot of your code before the lab time expires.If you feel that you need more time to practice the lab script, you can download Kali Linuxand use it. Keep in mind your nmap script will not be the same, so you would have to copythe script to the infoseclearning environment before submitting.LOCAL INSTALLATION USING VIRTUALIZATION SOFTWARE INSTRUCTIONS1. Choose your virtualization software (either works fine and they are both free):o VirtualBox:o https://www.virtualbox.org/wiki/Downloadso VMware Workstation Player:o https://my.vmware.com/en/web/vmware/free#desktop_end_user_computing/vmware_workstation_player/14_02. Kali Linux can be downloaded from:o https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-hyperv-image-download/3. Metasploitable can be downloaded from:o https://sourceforge.net/projects/metasploitable/files/Metasploitable2/4. If you need additional help installing Kali, please review Kali Linux Revealed for step-by-stepinstructions:o https://kali.training/downloads/Kali-Linux-Revealed-1st-edition.pdf

INSTRUCTIONS1. Write a script that will run an Nmap scan of metasploitable. The script should be named script.sh.The script is required to do the below. (Hint: These are separate options that you will need toconfigure for your nmap scan)o Scan only the top 5 portso Do not pingo Get Service versionso Scan as fast as possibleo Do not resolve nameso Do not invoke the nmap nse scripts (this means you can’t use the ‘-A’ option)

Page 2: files.transtutors.com€¦  · Web viewWhen completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat

2. After the nmap scan completes, have the script automatically attempt to use rloginagainst the metasploitable box. It should accept the default username that willautomatically be sent. You will need to provide msfadmin as the password when prompted(per the script output below)o rlogin to the metasploitable machine that you just scanned with nmap. This shouldautomatically run as part of the script – do not have the script prompt you for the target tolog into. It should use the IP address that was passed via the read command.3. Ensure the script prints the following information to the screen in addition to what is inthe screen output below:o Change your host name to your last name as we’ve done in the labso The IP Address of your Kali machine – this should not be hard-coded, i.e., it should not bemanually typed like “echo 192.168.1.132” - the IP Address should be generated as a resultof having the script run the ifconfig command and use tools like grep and cut to format itneatly.o Print the IP Address of the Metasploitable target you are scanning. If you are using theinfoseclearning lab environment, it will have the IP Address of 192.168.1.30. If you are usingyour own lab set-up, it will differ. Use the “read” command to accept input from the user,e.g.,o Print the Scan date using the date command. You will need to use one of the date options toget the date output formatted like the screenshot below

Page 3: files.transtutors.com€¦  · Web viewWhen completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat

SUBMISSIONOnce you have completed the hands-on portion of the Midterm, paste screenshots into aMicrosoft Word document and upload to Canvas. Your screenshots should look somethinglike this (this is a sample script, this is not what yours will look like):

1. script.sh

Page 4: files.transtutors.com€¦  · Web viewWhen completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat

2. Screen output of running script.sh

Page 5: files.transtutors.com€¦  · Web viewWhen completed, you will have one Microsoft Word document with two screenshots: 1. script.sh (Note: This will be the output of running: “cat