Problem: Ethical Hacking - Penetration Test, Web Application Analysis
• Document the setup of the environment as you are preparing to conduct a penetration test for a customer. As described in class, do a complete recon and come up with a potential attack plan. Describe your efforts and plan in a 2 pages report of the tools and methods that you will be using to conduct the test.
• Setup and configure the system to run 3 types of Web servers on 3 different systems:
o Ubuntu - Web server of your choice (i.e., Apache) - 10.10.1.11
o Metasploitable - already running Web services - 10.10.1.12
o Windows - IIS Web server. - 10.10.1.13
Use the Kali system to perform a vulnerability scan of the different Web servers to identify possible exploits. Document up to 3 vulnerabilities for each environment. Provide screenshots of the Oracle Virtual Machines to demonstrate the configuration.Some tips:- You don't have to run all four systems at once, pair Kali-Ubuntu, complete tasks, shutdown Ubuntu, then Kali-Metasploitable, etc.- Make sure you don't run out of CPU, memory, storage by overprovisioning VMs; usually 2GB and 1 or 2 cores each is enough. The suggested computer setup is 4 core CPU (8 with hyperthreading) and 16 GB RAM.- Take screenshots of Kali and target systems and include them in your submittal, along with narration of your steps and the thought process.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.