Main Menu

My Account
Online Free Samples
   Free sample   Metasploit cyber security exploring zenmap kali linux

Metasploit Cyber Security: Exploring Zenmap In Kali Linux


Task: For this assignment you will identify security vulnerabilities/ weaknesses in an application(s) or service(s) by evaluating the applications or service or operating system with various penetration testing tools/ techniques on Virtual Box.

Your task is to complete the testing with demonstration in class and write a report on the following:

  1. Must complete the testing using the following two penetration techniques: Metasploit Framework and Zenmap in kali linux.
  2. Install/deploy the penetration testing tool or technique victim servers on your computer or on MIT Virtualbox.
  3. You are to exploit and to identify security vulnerabilities in an application; that is the process to identify essential information from outsiders like hackers or insiders who can have unauthorized access to system. This should be thoroughly presented in the report.
  4. Lab demonstration: Must demonstrate and explain how each tool works in class to your instructor before week 6, and demonstration/explanation time must not be more than five minutes.
  5. Report: Compile a written report of the above along with your evaluation and recommendations. The report must contain several screenshots of evidence and a short description for each snapshot that you actually did the work and introduction for each penetration tool, along with accepted references. Report length should between 1500 to 2000 words. Marks will be deducted for report length outside the give word range.


The selected tool is Metasploit which is an integrated platform for handling and performing the different security tests for the applications on web. There are tools which work for the complete support of the testing and the processing from the initial mapping as well as the analysis of the application. This is setup through the proper finding of the attack surface as well as the exploitation of the different security vulnerabilities.

In this metasploit cyber security, the tool Zenmap has been explored in Kali Linux as well. The tool has been started with the command line interface, and the testing on the same has been done. The features of e tools have been checked, and the analysis has been done on how to use the tool for the penetration testing. The tool has been started with the default feature.

In this project, no actual site has been hacked or testing has not been done in anyway which can cause any harm to the users of an actual site. All the testing has been done so that the analysis of the tools can be done and the result can be used for the analysis purpose. The command line interface and some commands has been explored. Screenshots has been attached in the report.

Burp has been able to give a complete control by letting the advancement of the manual techniques which are set under the state-of-art combination to work faster with more effectiveness. The suite is easily used with the allowing of the new users to work in a proper manner. These are highly configured with a proper numbered features which are important for the assistance of the experienced testers. The burp suits has been created by a Port Swigger which is a complete JAVA based software tool platform for the performance of the proper testing of security of different web applications. This is based on the combination of the automated and the other manual settings which are based on holding the following tools.


  1. Proxy Burp – This allows us to inspect and properly modify the traffic which is between the applications of the browser and the target system.
  2. Spider- This allows the application awareness to handle the content of crawling and the functionality patterns.
  3. Scanner- This is mainly to evaluate the advanced web applications for the automation process which is mainly for the detection of the different types of the vulnerability features.
  4. Intruder tool- This is mainly for handling the performance of the powerful and the customised attacks which are mainly to find the unusual vulnerability.
  5. Repeater- This is mainly for the manipulation of the requestions ad resending them to the individuals.
  6. Sequencer- It is mainly for handling the testing of the session tokens with the randomness.

The Metasploit gives us the ability to save work and help in the extension which will easily allow all the plugins to be written easily for performing different complex tasks which are highly customised in the system of Burp. It has the ability to handle the work where you can resume it anytime you want.

Techniques used by the tool
The major focus in this metasploit cyber security has been on the mapping of the different applications of the web which automate the tasks of the catalogues along with handling the content and the functionality. This work lets us to work through the browser by properly inspecting all the traffic which is being passed through the proxy as well as the catalogue. There have been active crawl of the applications which are based on following the links automatically with the submission of the forms and the response for the content. They are able to take hold of the spiderling actions with the detailed configuration of the spider engineer. After the process of the entire application, the Burp site is able to review the entire content for discovering the active spiderling functions.

  1. Comparer: It is able to handle the data items between the two different responses of the web applications. These are mainly to identify metasploit cyber security and handle the failed log with the invalid and the valid usernames and the received resources to identify the different requests on the different behavioural patterns.
  2. Decoder: This transforms the raw data in an encoded form and then to the canonical version. It has a complete ability to recognise the different coding formats.
  3. Sequencer: This is able to analyse the application sessions which are set under the randomised token with the unpredictability depending on the security.
  4. Repeater: The modifications of the individual requestions are HTTP and response. These are set for sending the requests to the Repeater from a particular site map targets which completely attack the results or are through the browsing history patterns for the Burp Proxy.
  5. Intruder: This is mainly for the optimisation of the customised attacks.
  6. Scanner: This is mainly by setting the tests of penetration which fits with the different techniques for the performance of the semi-automated and the penetration tests of the web applications.
  7. Proxy: These are mainly set to handle the testing and the attacking application on the web server. The operations are between both the target and the end web browser as a settled middle-man. These are able to completely modify, inspect and handle the raw traffic which is passed in different directions.

The selected profile has been the Response Profile which is able to follow the security systems with the different promotional effects. As per the review, there have been relations to determine the attempts of the disruption and service denial. The focus has been to research and handle a response which is able to handle the different security constituency. CERT Approach has been to look forward to control all the enforcement of law as well as strengthening the knowledge systems to handle the unique preparatory setup.

Response Profile stacks up to hold the storm which is responsible to identify and manage the risks with the improvement of defences against all the events. This includes the operations of the team with the results they delivery. It is able to handle the advanced threat protection for all the enterprise and service providing network to assess and launch the peers which evolve beyond the existing detection.

CERT Australia is able to incorporate the current range of the cyber security to provide the Australians to process and access the information on vulnerability in the systems. A proper approach to promote towards a greater shared understanding helps in setting the nature and the scale of the cyber security issue. This is also able to provide the Australian point to expand the global community with the effective support and cooperation.

The mitigation process could be to make the Australians of the cyber risks with the security to protect the identities as well as the financial information online. The inalienable qualities generally tend to hold the digital security dangers with the Australian group. This is completely able to determine the trusts as well as other instructs in the cyber risks.

Cyber Law and cyber security has been able to help in defining the specific ranges to properly certify to provide proper communication and services. This law has helped in cyber forensic investigation to deal with the clients, along with having an experience of the internet and technology law. There have been certain converse Security Council who works to perform a certified plan with a security intelligence system. This is based on the Symantec security which realise how the consumers need to adapt to all the evolutionary changes.

The response profile used in this metasploit cyber security helps in analysing a proper search for all the domains and the national fringes. The Australian Government has been successfully able to build u a Commonwealth Organised Crime Strategic Framework. This is able to reach to a more accomplishing doing, with the guarantee of the law requirements, knowledge, and strategy. It is important for teaming up with success with the State and Territory partners.

Installation and Testing

metasploit installation process

metasploit installation in kali

metasploit installation in kali

metasploit installation in kali

metasploit security testing tools

metasploit cyber security testing tools

metasploit cyber security tools

Metasploit has been able to handle the tools integration with the focus on the performance of the different security tests on the different web applications. These are mainly to perform the web attacking applications. It contains all the interfaces and the tools which are mainly for the speed up and the process facilitation of the different applications. The tools mentioned in this metasploit security testing tool are mainly set for handling the framework of the extensibility, alerts, login and the other upstream proxies which are important for the setup of the authentication, HTTP request and the persistency. This is also able to combine the automation of the techniques to attack, scan and properly analyse the applications on the web. The tools mentioned in this metasploit security testing tool for the working of Burp are set to allow the identified findings along with holding the foundation of the different tools and the system process. These are mainly for the identification of the vulnerability process to map and set the exploitation phase. Metasploit cyber security assignments are being prepared by our IT assignment help experts from top universities which let us to provide you a reliable assignment help online service.

Druin, J. (2012). Mutillidae: Brute Force Page Names using Burp-Suite

Intruder. Retrieved June, 30, 2013.

Garn, B., Kapsalis, I., Simos, D. E., & Winkler, S. (2014, July). On the applicability of combinatorial testing to web application security testing: a case study. In Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing (pp. 16-21). ACM.

Sidiropoulos, N., & Stefopoulos, P. (2013). Smart tv hacking. Research project, 1, 2012-2013.

Scandariato, R., Walden, J., & Joosen, W. (2013, November). Static analysis versus penetration testing: A controlled experiment. In Software Reliability Engineering (ISSRE), 2013 IEEE 24th International Symposium on(pp. 451-460). IEEE.


Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment









9/1 Pacific Highway, North Sydney, NSW, 2060
1 Vista Montana, San Jose, CA, 95134