Home‎ > ‎CIS 75‎ > ‎

Lab 15: Data Theft

During class do Lab 15: Importance of Data Security - Data Theft. In the lab you will scan a potential victim to find out what operating system it uses. You will find that it's vulnerable to a known exploit and use that exploit to gain access to the victim. Once you have access you will steal data. Metasploit uses the network scanner NMAP to find the vulnerable machine. Once you have completed the lab answer the following questions: 
  1. How does NMAP identify the operating system of a victim? 
  2. Should you use Metasploit against production systems and networks? (i.e. networks that you depend on to stay available).