Answered You can hire a professional tutor to get the answer.
Need to build a project document with all the screenshots of the results. Please use the below instructions. 1: Create 3 VirtualBox VMs: 1. Ubuntu 16, 2; Kali Linux; & 3. Metasploitable. 2: Use Meta
Need to build a project document with all the screenshots of the results. Please use the below instructions.
1: Create 3 VirtualBox VMs: 1. Ubuntu 16, 2; Kali Linux; & 3. Metasploitable.
2: Use Metasploit and Armitage on your Kali machine to find a successful exploit.
3: Samhain and Host IPS protection: Install Samhain on the Ubuntu VM, configure it to create alerts.
4: Install pFSense on Ubuntu VM & block UDP traffic
5: Design a cybersecurity strategy for defending against the attacks in this project.