Writing Homework Help

Estrella Mountain Community College Applied Exploitation Using Metasploit Essay

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

While the scope of this class does not cover writing our own exploits, there are many libraries of exploits available to the security practitioner. One such library is Exploit Database, from Offensive Security. Metasploit is an exploit framework that provides access to the Exploit Database.

  1. Using GCU Approved Virtualization Solution and Metasploit available in Kali Linux, exploit three or more vulnerabilities discovered in the Vulnerability Assessment assignment on the virtual machines.
  2. Document findings under Phase Testing in the “PEN Testing Report Guidelines,” located in the Course Materials. Refer to the SANS Institute industry-standard “Writing a Penetration Testing Report,” for examples of PEN Testing Report.
  3. Append this assignment to the PEN testing report and resubmit the report (Passive Corporate Recon + Automating Information RECON + NMap Scan + Vulnerability Assessment + Applied Exploitation using Metasploit).

In a 500- to 750-word essay, research the following concepts/terms. Discuss how these concepts/terms aid in the exploitation of a host system.

  1. Return-oriented programming
  2. Buffer overflows
  3. Password weaknesses
  4. Vulnerability Race conditions
  5. Numeric over/underflows
  6. User-space vs. Kernel-space vulnerabilities