Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman

Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman

Author:Alan T. Norman [Norman, Alan T.]
Language: eng
Format: epub, pdf
Published: 2016-12-17T08:00:00+00:00


A Virtual Windows Vulnerability Assessment

Operating systems contain multiple software vulnerabilities that hackers are ready and willing to exploit. When a hacker discovers an un-patched version of an OS, there are a number of commonly available exploits with which to gain access. The first step in deploying those exploits is to analyze the OS for the most glaring vulnerabilities. Kali Linux features natively installed tools that will scan a system and provide a list of vulnerabilities. This exercise will require two virtual machines running within the same system (regardless of the host OS). It will also require an installation image for an older, unsupported, and un-patched version of Microsoft Windows (Windows ’95 or ’98 are good choices). These images can be obtained online (usgcb.nist.gov) or from an old CD.

What you need:

1) A computer with any OS

2) Virtualization software

3) The latest version of Kali Linux

4) An unsupported, un-patched version of Microsoft Windows

Setting up:

1) Install Kali Linux on a virtual machine

2) Install the target Windows distribution on a virtual machine (on the same host system as Kali)

Procedure:

1) Execute a network scan from the Kali virtual machine using a program called nmap

2) Practice changing various settings in nmap so that OS vulnerabilities will be detected and displayed

3) Make note of the listed Windows vulnerabilities and begin researching exploits!



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.