{"id":6782,"date":"2020-10-12T17:17:29","date_gmt":"2020-10-12T21:17:29","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/?p=6782"},"modified":"2020-10-12T17:17:29","modified_gmt":"2020-10-12T21:17:29","slug":"guidance-for-2nd-assignment","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/2020\/10\/12\/guidance-for-2nd-assignment\/","title":{"rendered":"Guidance for 2nd Assignment"},"content":{"rendered":"<p>Identify a target you own or having written permission to target.\u00a0 I strongly recommend &#8220;Metasploitable&#8221; as it will be the simplest path.<\/p>\n<p>Identify a vulnerability in your target using nmap, nessus, or any other tool you want to use.<\/p>\n<p>Use Metaspolit to create an exploit and comprise your target.<\/p>\n<p>Create a 3 page slide deck and a 1 &#8211; 2 page executive summary describing what you found and what mitigation you would recommend.\u00a0 Write the assignment as if you where communicating to someone who hired you to test one of their machines.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identify a target you own or having written permission to target.\u00a0 I strongly recommend &#8220;Metasploitable&#8221; as it will be the simplest path. Identify a vulnerability in your target using nmap, nessus, or any other tool you want to use. Use Metaspolit to create an exploit and comprise your target. Create a 3 page slide deck [&hellip;]<\/p>\n","protected":false},"author":8584,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[803560],"tags":[],"class_list":{"0":"post-6782","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-07-netcat-and-hellcat","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/users\/8584"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/comments?post=6782"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6782\/revisions"}],"predecessor-version":[{"id":6783,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/posts\/6782\/revisions\/6783"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/media?parent=6782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/categories?post=6782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec702fall2020\/wp-json\/wp\/v2\/tags?post=6782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}