Network Security
Introduction
0. Abstract
1. Introduction
2. Kali Linux
2.1 Nmap
2.2 Metasploit
2.2.1 Armitage
2.3 tcpdump
2.4 Wireshark
2.5 xspy, xkey & Xwatchwin
3. Additional Penetration Testing Tools
4. Attacking Targets
4.1 Target 0
4.2 Target 1
4.3 Target 2
4.4 Target 4
4.5 Target 5
4.6 Target 6
4.7 Target 9
4.8 Target 10
5.Attacks on other groups
5.1 Phishing
6. Network IDS
7. Conclusion
References
Powered by
GitBook
4. Attacking Targets
4. Attacking Targets
The team used the network penetration tools to try to compromise all of the target machines. While we had some success on certain targets, others proved to be more difficult to access.
results matching "
"
No results matching "
"