Create Your First Trojan and Infiltrate a Target

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Metasploit Ibbl used for?
A secure Linux machine for testing
A tool for creating secure networks
An intentionally vulnerable Linux machine for practicing exploits
A Windows 10 emulator
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the attack process on Windows 10?
Running the Metasploit console
Creating a malicious executable program
Changing the IP address
Downloading Metasploit Ibbl
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to combine MSF payload and MSF encode?
MSF Combine
MSF Venom
MSF Join
MSF Merge
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which payload is used in the demonstration?
Windows Meterpreter Reverse TCP
Linux Shell Reverse TCP
Windows Shell Bind TCP
Linux Meterpreter Bind TCP
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the 'multi/handler' command in Metasploit?
To start the Metasploit console
To encode the payload
To handle incoming connections from the target
To create a new payload
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What command is used to list the directory contents on the compromised machine?
dir
ls
list
show
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command allows you to acquire a Windows shell on the target machine?
run
shell
cmd
execute
Similar Resources on Wayground
5 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Metasploit Modules Explained

Interactive video
•
University
5 questions
Bug Bounty Program Certification 6.3: Create a Virus and Infect the Machines in Network

Interactive video
•
University
2 questions
Create a Malicious Application

Interactive video
•
University
2 questions
Execute a Phishing Attack

Interactive video
•
University
2 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Exploiting Metasploitable2

Interactive video
•
University
8 questions
Describe cyber attacks that could affect a computer system or network : Creating Reverse Shell with Metasploit

Interactive video
•
University
8 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Creating Android Payloads with Msfvenom

Interactive video
•
University
5 questions
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - The Metasploit Console

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University