diff_months: 19

Fundamentals of Cyber Security Assignment

Download Solution Now
Added on: 2022-11-16 11:58:25
Order Code: 476561
Question Task Id: 0
  • Subject Code :


  • Country :


Preamble: Metasploit (MSF) is world’s one of the most used penetration testing frameworks. Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers arms defenders to always stay one step (or two) ahead of the game. The learning curve of Metasploit is much more intense than Session 9 and Session 10 cover as part of this unit. The aim of the labs and instruction designed in Session 9 and Session 10 was mainly to give you a glimpse of the enormous potential that a penetration tester can do. If you are passionate and want to learn more, then you can explore yourself and join the community.

In this assignment, the goal is to enhance your learning a little bit toward practical implications.


a) Gain remote access to another machine using Metasploit by exploiting one of the open ports) Copy a file from the target remote machine to the machine where MSF is installed.

Environment Needed:

a) Virtual Box (VBox)b) Kali Linux installed in VBoxc) MSF installed in Kali Linux) Metasploitable installed in VBox

Visual Topology inside VBox:


1. Environment Setup:

a. Kali Linux and Metasploitable Linux Machine should be installed in VBox (you can choose VMWare too)

b. Demonstrate the connectivity between Kali Linux and Metasploitable Linux Machine (Hint: a screenshot of the pinging result)

2. Creating the target file:

a. Encrypt the following information using asymmetric cryptography and store the cyphertext in a file namely personalData.txt

i. Your Name + Student ID

b. Hide the private key inside an image using the necessary steganography tool. Name the image as secret.jpg

c. Save personalData.txt and secret.jpg in the home directory of ‘Kali Linux’

3. Remote session setup:

a. Using the MSF framework from Kali Linux find all the open ports of Metasploitable.

b. Use one of the open ports to create a session from Kali Linux to Metasploitable.

c. Copy personalData.txt and secret.jpg to Metasploitable.


Our Cyber Security  Expert has solved this Cyber Security  Assignment at Exam Question Bank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well-trained to follow all marking rubrics & referencing Styles. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Katthy Wills
  • Posted on : November 16th, 2022
  • Downloads : 0
  • Views : 239

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan


80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing


30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%


20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more