Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ABC lab 11-Last Saved 4/12/2018 10:49 PM ut References Mailings Review View Help

ID: 3706772 • Letter: A

Question

ABC lab 11-Last Saved 4/12/2018 10:49 PM ut References Mailings Review View HelpT Tell me what you wa T Normal 1 No Spac... Headin Paragraph 2. 3 Discussion Questions 1. Where are the weblogs stored on the BackTrack machine running Linux? 2. How do you search for Internet Explorer exploits within Metasploit? 3. What can a user do in Outlook or Outlook Express to validate a hyperlink? 4. What can be done instead of clicking a hyperlink if you want to visit a website? 3.3 Discussion Questions 1. How do you add a route to the victim network using Metasploit? 2. How do you scan machines on the internal network using Metasploit? 3. What does an attacker from the Internet know about an internal network? 4. What is the Meterpreter command to get a command prompt on the victim?

Explanation / Answer

Solution:

Note: The first question is done as per Chegg guidelines, please repost others.  

2.3.1)

The weblog can be accessed by running the command given below:

/var/log/apache2/access.log

2.3.2)

msf >search name:"Internet Explorer" type:exploit

2.3.3)

The hyperlink can be validated by hovering on it and go into the properties.

2.3.4)

You can change it in the options and the hyperlink will open based on the command you choose or ctrl can be used to open.

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote