Penetration testing work
Budget
221$
per month
Posted: 5 years ago
Opened
- Description
- Requirement is to build three Virtual Machines (VM): 1. A Server :E.g. you could use CentOS or Ubuntu Server o Minimum configuration required ▪ Two services of your own choice (e.g. DNS, HTTP, DHCP, FTP, SMTP, etc) 2. A Client :Could be either Windows (Visa, 7, 8, 10 etc) or Linux (Fedora, Ubuntu etc) o You could create multiple copies of the client’s VM if you require more clients to demonstrate an attack 3. Attacker machine ( Kali Linux)
Provide a summary of the configuration steps on the server and client. Include screenshots to evident functionality at the client-side. Explain the rationale behind service selection and configuration. • Demonstrate a minimum of 2 attacks against each of the two services configured.Log all the important and offensive events against your target including attacks detected, services’ logs nature, origin of the attack and damage caused. Support your demonstration with screenshots. Critically reflect on countermeasures and prevention mechanisms applied to mitigate against your attacks.
Skills:
ubuntu,client server,Community Enterprise Operating System (CentOs),Dynamic Host Configuration Protocol (DHCP),fedora linux,File Transfer Protocol (ftp),microsoft windows,virtual machine
- Category
Source: peopleperhour.com