Brute Force Attack

Brute Force Attack


- The report details the ethical hacking technique used to carry out an attack on a vulnerable Metasploitable2 system running the Kali Linux operating system. The network topology for the attack was presented using packet tracer, which reflects the attack's overview. Other tools have been utilized in this course, including VMware to launch Kali Linux and Metasploitable2 from which we carried out the attack and other tools such as nmap. Each step of the attack has been discussed in detail, and screenshots have been provided to show what was actually done in the report which link is given above.