BIRMINGHAM - University Project
کد:
Configuring a security lab with VMware Player (Windows) Configuring a security lab with VMware Fusion (Mac OS X) Installing Ubuntu Server Installing Metasploitable2 Installing Windows Server Increasing the Windows attack surface Installing Kali Linux Configuring and using SSH Installing Nessus on Kali Linux Configuring Burp Suite on Kali Linux Using text editors (VIM and Nano) Chapter 2: Discovery Scanning Using Scapy to perform layer Using ARPing to perform layer Using Nmap to perform layer Using NetDiscover to perform layer Using Metasploit to perform layer Using ICMP ping to perform layer Using Scapy to perform layer Using Nmap to perform layer Using fping to perform layer Using hping3 to perform layer Using Scapy to perform layer Using Nmap to perform layer Using hping3 to perform layer Chapter 3: Port Scanning UDP port scanning TCP port scanning UDP scanning with Scapy UDP scanning with Nmap UDP scanning with Metasploit Stealth scanning with Scapy Stealth scanning with Nmap Stealth scanning with Metasploit Stealth scanning with hping3 Connect scanning with Scapy Connect scanning with Nmap Connect scanning with Metasploit Connect scanning with Dmitry TCP port scanning with Netcat Zombie scanning with Scapy Zombie scanning with Nmap Chapter 4: Fingerprinting Banner grabbing with Netcat Banner grabbing with Python sockets Banner grabbing with Dmitry Banner grabbing with Nmap NSE Banner grabbing with Amap Service identification with Nmap Service identification with Amap Operating system identification with Scapy Operating system identification with Nmap Operating system identification with xProbe2 Passive operating system identification with p0f SNMP analysis with Onesixtyone SNMP analysis with SNMPwalk Firewall identification with Scapy Firewall identification with Nmap Firewall identification with Metasploit Chapter 5: Vulnerability Scanning Vulnerability scanning with Nmap Scripting Engine Vulnerability scanning with MSF auxiliary modules Creating scan policies with Nessus