CYB 4 – Assisgnment Academic Essay

Order Description

Use our book as a main reference: Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .
Chapters to use
• Chapter 4: Exploitation
Medusa Password Cracking
Medusa will try different password combinations until it successfully logs in, and then it will give the success message. You can see the Medusa software post a success result in this video. There is also a screenshot example of a successful result on page 84 of the textbook (See attached document).
Use Medusa to authenticate to a remote service (FTP, Telnet, VNC, etc.) found on a target virtual machine during the reconnaissance phase.
Take a screenshot of your results. The screenshot should show the repeated password tries along with a success result. Medusa should report a success message. This would prove that the software was successfully installed, the attempt to hack into a target system, and the successfully acquired password.
Submit the screenshot of your results as a file upload for grading.
Medusa Youtube video

I will include the previous order for the reconnaissance phase in case you needed.

This entry was posted in Academics on by Excellent Academic Writers.

About Excellent Academic Writers

Excellent Academic Writers was established back in 2007. Over the years we have evolved into a strong company offering clients with high quality papers that meet their stated requirements resulting in 95.0% customers returning and being loyal customers with us. After ordering a paper with us you can get the paper within 3 hours!


Is this question part of your assignment?

Place order