Pt1420 Unit 5 Lab Report

Superior Essays
Lab #5: Introduction to Metasploit on Kali Linux
Team: CRYPTERS

1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search.
It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010) Their privileges has to be elevated to modify the underlying system. Some of the problems that comes when operating the Linux environment as a root user are:
1. Much more prone to mistakes or software bugs. Running the program as a different user
…show more content…
As a root user, one has the option of giving full permissions to a malicious software or vulnerability. It can change programs in /bin and add backdoors, mess with files in /etc and make the system unbootable, etc.
3. You can be victim of your own stupidity. Swapping of input/output device in data dictionary would be stopped by your lack of permissions, but if you run as root, you have all accesses.
4. Administrative work on the OS should be handled only by root. You don't need it for most uses.(Renan October 18, 2012)
1 f. What would happen if you just started the metasploit service without the postgresql service? Even if you can start the metasploit service without it, is it needed (Why/Why not)? What does the service do for Metasploit? (Hint: You can do this in a new terminal window)
When we start the metasploit service without the postgresql service, we get a screen as shown below. PostgreSQL is an object-relational database management system (ORDBMS) based on POSTGRES, Version 4.2(Postgresql). In Kali Linux environment, no network services, including database services, run on boot as a default. So to get the metasploit services up and running, a database needs to be launched first(Documentation). That is why postgresql service started. Some of its functions include storing data securely, supporting best practices, etc. It can handle workloads ranging from small applications to large applications with many concurrent users(Wikipedia October 18, 2015). Metasploit uses
…show more content…
Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.

3 e. How many options are there? How many of these are required? As seen in snapshot, show command gave 2 options. RHOST and RPORT. Both are compulsory. The default RPORT is 135 which is the RPC port.

3 f. On the same output Metasploit returns a section called exploit target, which operating systems will this exploit work on? Exploit command works on English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 Universal

3j. What did the output of the screen show? Was the exploit successful, how do you know? The output screen displayed the following: We can make out from the above screenshot that the exploit was successful because it says that the command shell session of the target ip address machine was opened and also the next prompt we see is of, C:\WINDOWS\system32> of the target machine which means that we have gotten access to the target machine. 3k. What type of connection is opened? What does this connection allow you to

Related Documents

  • Decent Essays

    Pt1420 Unit 6 Lab

    • 109 Words
    • 1 Pages

    One thing that definitely went wrong in the lab was that we had to round about two of our measurements and the reason being was that they were exact. To exemplify, when we were reading the volume for the finishing measurement of the base for trial three, we got exactly 45.00 mL. The only problem was that, we had didn’t really have the two significant decimal numbers. Hence, we rounded our volume to 45.01 mL. Also, we got exactly 23.00 mL for our finishing volume of the acid for trial three. Therefore, once again we rounded it to 23.02mL in order to get at least two significant decimal numbers.…

    • 109 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 3 Lab Report

    • 1315 Words
    • 6 Pages

    Objective Review: 1. Describe the purpose for using aseptic technique in collecting specimens Aseptic technique is used to prevent contamination of specimens by pathogenic organisms. The goal of maintaining asepsis is to not introduce any other organisms to the patient and prevent the spread of any organisms the patient may be carrying. Certain practices are used to help decrease this from occurring including cleaning, sanitizing, and disinfecting. Aseptic technique is an important process to prevent the spread of infection and diseases in the clinical setting (Hauswirth & Sherk).…

    • 1315 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    In today’s Business world it is critical to find the most efficient, cost effective and secure methods to facilitate the functionality of your business infrastructure. A company’s infrastructure can dictate the growth of the business and the capabilities of its effectiveness during business operations. This document has been created to compare three different Linux distributions, focusing on their offerings for server and workstation operating system products offered on an enterprise level. I will discuss the key highlights for each Distribution including Red Hat, Ubuntu, and Debian.…

    • 1782 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The fierce rivalry between Macs and PCs is one of the most bitter rivalries in the history of technology, but what's the real difference between these two systems in 2015? Its inspired a few very creative commercials and brought in corporations. But at a practical level, a lot of people do not understand the fundamental difference between a Windows PC and an Apple Mac. In this research paper, I will be doing a basic comparison between the two, as well as giving the pros and cons of each one. When you're building a computer, you always start with the physical hardware, you add an operating system, then you add applications on the operating system.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Sometimes one ‘cracker’, an unethical hacker, with more knowledge will have a small gang of script kiddies exploiting vulnerabilities and collecting a harem of ‘owned’ or compromised computer systems. The cracker acts as the leader,…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    It is supremely useful to identify sources of the vulnerabilities. Ramarkrishnan and Sekar (2002) argue that vulnerabilities stem from interactions among several system components such as operating system, file system, sever processor, and content. There is ample evidence that IT systems are facing serious security challenges. The nature of the threat has evolved, and with it, the sources, the perpetrators, the intent, and the consequence (Yeh and Chang, 2007). From the fear of forced access to physical entities…

    • 4254 Words
    • 18 Pages
    Superior Essays
  • Great Essays

    The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well.…

    • 1307 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 9 Lab Report

    • 812 Words
    • 4 Pages

    1. (8pts) From these data, graph your mean arterial pressure (MAP; see formula) and heart rate (y axes) vs. workload (in METS) on the x-axis (include resting results). Using this information, answer the following questions. Show ALL work. MAP…

    • 812 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Acceptable Use Policy

    • 552 Words
    • 3 Pages

    Inappropriate use can expose the network systems to security risks. Unacceptable use includes, but is not limited to: • The use TIJONCORE computer devices to transmit offensive material. • Purposely causing security breaches or purposely disrupting network comminication. • Introducing…

    • 552 Words
    • 3 Pages
    Great Essays
  • Great Essays

    Introduction: Operating system is the essential component that runs on a computer and it manages computer hardware and software resources, provides all the services required for the programs. The basic operations performed by the computer are when a user enters the key the output should be recognized, controls all the devices like printers and also keeps track of all the files. The different types of operating systems are • Multi user Operating system allows multi users to run the programs at the same time. • Multi-processing allows the program to run on more than one CPU • Multi-tasking allows more than one program to run parallel • Multi-threading supports the same program to run concurrently as different parts • Real time…

    • 2243 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Microsoft Windows Failures Microsoft has undoubtedly had a major influence on the PC since its introduction of MS-DOS 1.0 in 1981. The introduction of the GUI has changed the way we use PCs since the days of MS-DOS, and it’s impossible to think about the computing world without it today. A GUI isn’t the only thing that makes an operating system, its performance, familiarity, hardware support and security all play important roles to their success or failures. Windows 1.x Windows 1.x was Microsoft’s first attempt at creating a GUI interface based operating system and required you to install it on top of MS-DOS 2.0 (Hollister, 2012). This first Windows OS was considered a failure’, because of promises Microsoft made that they couldn’t deliver.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ptfe Lab Report

    • 1386 Words
    • 6 Pages

    The carbon supported PtFeS catalysts were prepared by a modified polyol method. In brief, 0.3 g carbon (Ketjen-black heat-treated at 2250 °C, SE = 160 m2 g-1) was dispersed in 135 g ethylene glycol. 5.993 g of 8 wt% H2PtCl6 (Umicore; Pt content, 39.8 wt%), 1.874 g of 8 wt% FeCl3. 6H2O (Sigma-Aldrich), and 0.352 g of 8 wt% (NH2)2SC (Sigma-Aldrich) previously mixed in ethylene glycol were added to the dispersion. The pH of the stirred reaction mixture was adjusted to ∼11 using 1 M NaOH dissolved in ethylene glycol.…

    • 1386 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Soap-N-Suds Case Study

    • 1150 Words
    • 5 Pages

    Our company, Soap-n-Suds, has decided to get up to date with the latest Microsoft technology in order to advance our software and operating systems. Currently are operating on Window 6 desktop computers, however we would like to better our operating systems in order for Soap-n-Suds to be the best it can be. Therefore, recently we have been doing some much needed research on a couple of operating systems -- Microsoft, OS X El Capitan, and Linux 7 -- in order to see which would work best for our company. Additionally, as far as getting our company to reach its fullest potential goes our company have gone through a list of questions for each operating system in order to compare them to one another. Thus, the following information is all that we’ve accumulated this past week or so of the the three operating systems.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Often I am asked why I use Linux and if I would I would recommend it to them. I wish the answer was an easy one. I cant speak for every Linux user however, most that I have met have something similar in mind, Freedom. It usually begins with friends or other acquaintances that somehow coerced me into helping them fix or repair their computer.…

    • 1048 Words
    • 5 Pages
    Improved Essays