{"id":566,"date":"2025-03-05T03:06:45","date_gmt":"2025-03-05T03:06:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=566"},"modified":"2025-03-05T03:06:47","modified_gmt":"2025-03-05T03:06:47","slug":"assignment-4-ethical-hacking","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/assignment-4-ethical-hacking\/","title":{"rendered":"Assignment 4: Ethical Hacking"},"content":{"rendered":"\n<p>At the end of this module, each student must submit a report indicating the<br>completion of the following<br>tasks. Make sure you take screenshots as proof.<br>You need to power on the following VMs for this assignment.<\/p>\n\n\n\n<ul>\n<li>Internal Kali (Attacker)<\/li>\n\n\n\n<li>pfSense VM (power on only)<\/li>\n\n\n\n<li>Windows XP or Windows Server 2008 or Windows 7 (depending on the subtasks).<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Task A. Exploit SMB on Windows XP with Metasploit (20 pt, 2pt each)<\/h2>\n\n\n\n<p>In this task, you need to complete the following steps to exploit SMB vulnerability on<br>Windows XP.<\/p>\n\n\n\n<ol>\n<li>Run a port scan against the Windows XP using the Nmap command to identify open ports and services.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/1.5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"618\" height=\"196\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/1.5.png\" alt=\"\" class=\"wp-image-567\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/1.5.png 618w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/1.5-300x95.png 300w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>2. Identify the SMB port number (default: 445) and confirm that it is open.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/2.5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"117\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/2.5.png\" alt=\"\" class=\"wp-image-568\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/2.5.png 620w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/2.5-300x57.png 300w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>3. Launch Metasploit Framework and search for the exploit module:<br>ms08_067_netapi<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/3.5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"135\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/3.5.png\" alt=\"\" class=\"wp-image-569\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/3.5.png 624w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/3.5-300x65.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>4. Use ms08_067_netapi as the exploit module and set meterpreter reverse_tcp as the payload.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/4.5-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"267\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/4.5-1.png\" alt=\"\" class=\"wp-image-571\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/4.5-1.png 623w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/4.5-1-300x129.png 300w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"5\">\n<li>Use XXXX (follow the lab instructions) as the listening port number.<br>Configure the rest of the parameters. Display your configurations and exploit<br>the target.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/5.5-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"217\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/5.5-1.png\" alt=\"\" class=\"wp-image-573\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/5.5-1.png 626w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/5.5-1-300x104.png 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"6\">\n<li>[Post-exploitation] Execute the screenshot command to take a screenshot of the target machine if the exploit is successful.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"385\" height=\"41\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.png\" alt=\"\" class=\"wp-image-575\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.png 385w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6-300x32.png 300w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6-375x41.png 375w\" sizes=\"(max-width: 385px) 100vw, 385px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.5-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"377\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.5-1.png\" alt=\"\" class=\"wp-image-576\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.5-1.png 622w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/6.5-1-300x182.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"7\">\n<li>[Post-exploitation] In meterpreter shell, display the target system\u2019s local<br>date and time.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"49\" data-id=\"577\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/7.png\" alt=\"\" class=\"wp-image-577\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/7.png 625w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/7-300x24.png 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<ol start=\"8\">\n<li>[Post-exploitation] In meterpreter shell, get the SID of the user.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"87\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/8.png\" alt=\"\" class=\"wp-image-578\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"9\">\n<li>[Post-exploitation] In meterpreter shell, get the current process identifier<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-9 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"211\" height=\"34\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/9.png\" alt=\"\" class=\"wp-image-579\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"10\">\n<li>[Post-exploitation] In meterpreter shell, get system information about the<br>target.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-10 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"568\" height=\"166\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/10.png\" alt=\"\" class=\"wp-image-580\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/10.png 568w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/10-300x88.png 300w\" sizes=\"(max-width: 568px) 100vw, 568px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Task B. Exploit EternalBlue on Windows Server 2008 with Metasploit (20 pt)<br><\/h2>\n\n\n\n<p>In this task, you need to use similar steps to exploit the EternalBlue vulnerability on Windows Server 2008. Make sure to search and replace the exploit module against Windows Server 2008 accordingly.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"304\" data-id=\"581\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11.png\" alt=\"\" class=\"wp-image-581\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11.png 625w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11-300x146.png 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Configure your Metasploit accordingly and set XXXX (follow the lab instruction) as the listening port number. Display the configuration and exploit the target. (10 pt)<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-11 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"304\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11-1.png\" alt=\"\" class=\"wp-image-582\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11-1.png 625w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/11-1-300x146.png 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215102.png\"><img loading=\"lazy\" decoding=\"async\" width=\"621\" height=\"290\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215102.png\" alt=\"\" class=\"wp-image-585\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215102.png 621w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215102-300x140.png 300w\" sizes=\"(max-width: 621px) 100vw, 621px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol>\n<li>[Post-exploitation] Execute the screenshot command to take a screenshot of the<br>target machine if the exploit is successful. (2 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-13 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215244.png\"><img loading=\"lazy\" decoding=\"async\" width=\"619\" height=\"361\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215244.png\" alt=\"\" class=\"wp-image-587\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215244.png 619w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215244-300x175.png 300w\" sizes=\"(max-width: 619px) 100vw, 619px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"2\">\n<li>[Post-exploitation] In meterpreter shell, display the target system\u2019s local date and<br>time. (2 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215339.png\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"33\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215339.png\" alt=\"\" class=\"wp-image-588\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215339.png 620w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215339-300x16.png 300w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"3\">\n<li>[Post-exploitation] In meterpreter shell, get the SID of the user. (2 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-15 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215502.png\"><img loading=\"lazy\" decoding=\"async\" width=\"223\" height=\"36\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215502.png\" alt=\"\" class=\"wp-image-589\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"4\">\n<li>[Post-exploitation] In meterpreter shell, get the current process identifier. (2 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-16 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215607.png\"><img loading=\"lazy\" decoding=\"async\" width=\"247\" height=\"38\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215607.png\" alt=\"\" class=\"wp-image-590\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"5\">\n<li>[Post-exploitation] In meterpreter shell, get system information about the target. (2 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-17 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215708.png\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"142\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215708.png\" alt=\"\" class=\"wp-image-591\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215708.png 442w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-215708-300x96.png 300w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Task C. Exploit Windows 7 with a deliverable payload (60 pt)<\/h2>\n\n\n\n<p>In this task, you need to create an executable payload with the required configurations below. Once your payload is ready, you should upload it to the web server running on Kali Linux and download the payload from Windows 7, then execute it on the target to make a reverse shell (10 pt). Of course, don&#8217;t forget to configure your Metasploit on Kali Linux before the payload is triggered on the target VM.<\/p>\n\n\n\n<p>The requirements for your payload are (10 pt, 5pt each):<\/p>\n\n\n\n<ul>\n<li>Payload Name: Use your MIDAS ID (for example, pjiang.exe)<\/li>\n\n\n\n<li>Listening port: XXXX (follow the lab instruction)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/20.png\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"92\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/20.png\" alt=\"\" class=\"wp-image-592\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/20.png 624w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/20-300x44.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>[Post-exploitation] Once you have established the reverse shell connection to the<br>target Windows 7, complete the following tasks in your meterpreter shell:<\/p>\n\n\n\n<ol>\n<li>Execute the screenshot command to take a screenshot of the target machine if<br>the exploit is successful. (10 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-19 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/21.png\"><img loading=\"lazy\" decoding=\"async\" width=\"445\" height=\"39\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/21.png\" alt=\"\" class=\"wp-image-593\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/21.png 445w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/21-300x26.png 300w\" sizes=\"(max-width: 445px) 100vw, 445px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-20 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/22.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"381\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/22.png\" alt=\"\" class=\"wp-image-594\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/22.png 622w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/22-300x184.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"2\">\n<li>Create a text file on the attacker Kali named &#8220;IMadeIT-YourMIDAS.txt&#8221; (replace<br>YourMIDAS with your university MIDAS ID) and put the current timestamp in the file.<br>Upload this file to the target&#8217;s desktop. Then log in to Windows 7 VM and check if<br>the file exists. You need to show me the command that uploads the file. (10 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-21 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/23.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"246\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/23.png\" alt=\"\" class=\"wp-image-595\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/23.png 622w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/23-300x119.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-22 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/24.png\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"363\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/24.png\" alt=\"\" class=\"wp-image-596\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/24.png 622w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/24-300x175.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>[Privilege escalation] Background your current session, then gain administrator-level<br>privileges on the remote system<br>(10 pt). After you escalate the privilege, complete the following tasks:<\/p>\n\n\n\n<ol start=\"3\">\n<li>Create a malicious account with your name and add this account to the<br>administrator group. You need to complete this step on the Attacker Side. (5 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-23 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220408.png\"><img loading=\"lazy\" decoding=\"async\" width=\"621\" height=\"293\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220408.png\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220408.png 621w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220408-300x142.png 300w\" sizes=\"(max-width: 621px) 100vw, 621px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<ol start=\"4\">\n<li>Remote access to the malicious account created in the previous step and browse<br>the files belonging to the user, &#8220;Windows 7&#8221;, in RDP. (5 pt)<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220533.png\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"443\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220533.png\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220533.png 647w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220533-300x205.png 300w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-25 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220554.png\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"450\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220554.png\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220554.png 626w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/Screenshot-2025-03-04-220554-300x216.png 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>At the end of this module, each student must submit a report indicating thecompletion of the followingtasks. Make sure you take screenshots as proof.You need to power on the following VMs for this assignment. Task A. Exploit SMB on Windows XP with Metasploit (20 pt, 2pt each) In this task, you need to complete the &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/05\/assignment-4-ethical-hacking\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/566"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":602,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/566\/revisions\/602"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}