Health History and Screening of an Adolescent or Young Adult Client
February 8, 2018
Compare/Contrast · Treaties vs. Executive Agreements
February 9, 2018

Medusa Password Cracking

Order Description
Medusa Password Cracking
Medusa will try different password combinations until it successfully logs in, and then it will give the success message. You may want to watch the Medusa Password Cracking video under supplemental resources to help understand what is required. You can see the Medusa software post a success result in this video. There is also a screenshot example of a successful result on page 84 of the textbook.
Use Medusa to authenticate to a remote service (FTP, Telnet, VNC, etc.) found on a target virtual machine during the reconnaissance phase.
Take a screenshot of your results. The screenshot should show the repeated password tries along with a success result. Medusa should report a success message. This would prove that the software was successfully installed, the attempt to hack into a target system, and the successfully acquired password.
Submit the screenshot of your results as a file upload for grading.


"Is this question part of your assignment? We Can Help!"

Essay Writing Service