Network Security
Introduction
0. Abstract
1. Introduction
2. Kali Linux
2.1 Nmap
2.2 Metasploit
2.2.1 Armitage
2.3 tcpdump
2.4 Wireshark
2.5 xspy, xkey & Xwatchwin
3. Additional Penetration Testing Tools
4. Attacking Targets
4.1 Target 0
4.2 Target 1
4.3 Target 2
4.4 Target 4
4.5 Target 5
4.6 Target 6
4.7 Target 9
4.8 Target 10
5.Attacks on other groups
5.1 Phishing
6. Network IDS
7. Conclusion
References
Powered by
GitBook
7. Conclusion
7. Conclusion
Overall, we used many network penetration tools to scan, probe, and exploit various targets and groups. The team managed to compromise many targets and gain a better understanding on how to protect devices from network based attacks.
results matching "
"
No results matching "
"