CYB – Project 6Use our book as a main reference: Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .• Chapter 6: Web-Based Exploitation• Chapter 7: Post Exploitation and Maintaining Access with Backdoors, Rootkits, and MeterpreterUnit VI ProjectNikito and W3AF ScanUsing Nikto, scan a vulnerable web server on a virtual machine. Then, run a scan using W3AF against the same virtual machine. (Review Chapter 6 for more information about Nikito and W3AF.)Take a screen shot of your results.Analyze the results, and develop the conclusions, recommendations and implications. Be sure to cite any outside sources used in APA format.Include your analysis of results and screenshots in a Word document to submit for grading
CYB – Project 6
07
Aug