top of page

Project C: Ethical Hacking 

Project C consisted of upgrading a network for a company's client and also performing various cybersecurity tasks. I scanned and determined the vulnerabilities of a newly installed production server and of the Web server as well.  I also provided specific examples as shown above in slides, of how any vulnerabilities could be exploited.

Scenario

After Successfully Installing a Network Upgrade for your memory for your company's client, you have been asked to perform another cybersecurity service for that client. The client hired a consolation to install and configure a new server in their internal network to support production and operations. You are tasked with determining the vulnerabilities of the new production server and provide specific examples of how any vulnerabilities could be exploited. You are also tasked to perform the same service on the Webserver in the DMZ 

Network Diagram Project C .png

For this Project it introduces the Production Server as well as the Web server and the Kali Trusted Machine. The Steps I did to create this project:

Step1: I ran an nmap scan using Kali Trusted VM on the Web server's IP Address which is  10.200.0.12 using this command: (nmap 10.200.0.12 --script-vuln). I also used the same command on the Production server IP Address which was 192.168.0.21 (nmap 192.168.0.21 --script-vuln). Found out that on the Production Server and Web Server that there were some Well known Vulnerabilities 

Step 2: In Kali Trusted, I ran the Metasploit Framework. Metasploit is a powerful tool that cyber security criminals use to exploit multiple vulnerabilities to the target host PC as well as Ethical hackers use Metasploit to not only know how hackers run exploit on target machines but also how to prevent a target machine from being hacked as well. To sign into the Metasploit Framework I used: sudo msfdb run command which allowed me to sign into Metasploit 

Step3: Once getting into Metasploit this is where the fun begins; I ran an Backdoor Attack on both the Production Server and the Webserver. In order for me to successfully I had to search VSFTP which gave me a Matching Module. Next what I did was that I typed in use 0 since it was the only number that was in the matching module, had to set the RHOST for the Webserver IP Address and then run the exploit. When the exploit ran for the Webserver it found a shell which made the exploit successful. I also created a user for the Webserver to give that user administrative rights to the production server only 

Step4:I ran Ettercap on the Production server. Ettercap is a software that is on Kali Linux and Windows that both CyberSecurity Criminals and Ethical Hackers use for Man-in-the-middle attacks on LAN. Once running the Man-in-the-middle Attack on the production server I also ran Wireshark as well 

bottom of page