Computer science

Use our book as a main reference:Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .
Chapters to use
• Chapter 4: Exploitation
Medusa Password Cracking
Medusa will try different password combinations until it successfully logs in, and then it will give the success message. You can see the Medusa software post a success result in this video. There is also a screenshot example of a successful result on page 84 of the textbook (See attached document).
Use Medusa to authenticate to a remote service (FTP, Telnet, VNC, etc.) found on a target virtual machine during the reconnaissance phase.
Take a screenshot of your results. The screenshot should show the repeated password tries along with a success result. Medusa should report a success message. This would prove that the software was successfully installed, the attempt to hack into a target system, and the successfully acquired password.
Submit the screenshot of your results as a file upload for grading.
Medusa Youtube video

I will include the previous order for the reconnaissance phase in case you needed.

 

READ ALSO :   Sociology