SlideShare a Scribd company logo
Please complete and post the screenshots here. I can be reached at practicals.lab at G mail
as I won't be able to comment, or explain here because this platform does not provide end
users that access.
PYTHON PROGRAMMING DEFENSIVE SCRIPTING Preconditions: - VM Environment -
Two Host Systems: Windows 10 Professional and Kali Linux. - VM Environment - Two Target
Systems: Windows 7 and Metasploitable (Linux). - The internet available. - Python installed.
Task 1: Write a python script (code) and launch it from the HOST: Windows 10 Professional
(VM) to discover and remedy as many vulnerabilities as possible on TARGET: Windows 7
system (VM). In addition to the pip-audit tool, use three additional compatible open-source tools
to load into the V M environment from host systems to target systems to identify vulnerabilities
and remediate the vulnerabilities found. Briefly explain the specific purpose of the three
additional compatible open-source tools, packages, etc. you have chosen beyond the basic
python used to launch python script from the host system to the target that will identify and
remedy vulnerabilities. Task 2: Write a python script (code) and launch it from the HOST: Kali
Linux (VM)to discover and remedy as many vulnerabilities as possible on TARGET:
Metasploitable system (VM). In addition to the pip-audit tool, use three additional compatible
open-source tools to load into the VM environment from host systems to target systems to
identify vulnerabilities and remediate the vuinerabilities found. Briefly explain the specific
purpose of the three additional compatible open-source tools, packages, etc. you have chosen
beyond the basic python used to launch python script from the host system to the target that will
identify and remedy vulnerabilities. Outcomes 1. Screenshots of both written scripts. 2. Both
target systems must be scanned and remediated. 3. Screenshots of vulnerabilities and
remediations. 4. Host systems must be used to launch scans and follow-on activities remediation.
5. Identify what tasks will be done with Python scripts. 6. A description of all THREE tools,
packages, etc., beyond basic Python, used to complete the tasks.

More Related Content

Similar to Please complete and post the screenshots here- I can be reached at pra.pdf

Kinect installation guide
Kinect installation guideKinect installation guide
Kinect installation guide
gilmsdn
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
 
Client side exploits
Client side exploitsClient side exploits
Client side exploits
nickyt8
 
Impl installation manual
Impl installation manualImpl installation manual
Impl installation manual
Alkis Vazacopoulos
 

Similar to Please complete and post the screenshots here- I can be reached at pra.pdf (20)

PVS-Studio Now Supports Any Build System under Windows and Any Compiler. Easy...
PVS-Studio Now Supports Any Build System under Windows and Any Compiler. Easy...PVS-Studio Now Supports Any Build System under Windows and Any Compiler. Easy...
PVS-Studio Now Supports Any Build System under Windows and Any Compiler. Easy...
 
Kinect installation guide
Kinect installation guideKinect installation guide
Kinect installation guide
 
Install guide
Install guideInstall guide
Install guide
 
Install guide
Install guideInstall guide
Install guide
 
Installing Python on Mac
Installing Python on MacInstalling Python on Mac
Installing Python on Mac
 
Mpi.net tutorial
Mpi.net tutorialMpi.net tutorial
Mpi.net tutorial
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
Backtrack Manual Part6
Backtrack Manual Part6Backtrack Manual Part6
Backtrack Manual Part6
 
CodeShip
CodeShipCodeShip
CodeShip
 
Installing Python on Windows OS
Installing Python on Windows OSInstalling Python on Windows OS
Installing Python on Windows OS
 
Python Lecture 0
Python Lecture 0Python Lecture 0
Python Lecture 0
 
Client side exploits
Client side exploitsClient side exploits
Client side exploits
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
 
Metapwn
MetapwnMetapwn
Metapwn
 
Impl installation manual
Impl installation manualImpl installation manual
Impl installation manual
 
Prizm Installation Guide
Prizm Installation GuidePrizm Installation Guide
Prizm Installation Guide
 
Lifnaaaaaa e
Lifnaaaaaa eLifnaaaaaa e
Lifnaaaaaa e
 
DESKTOP GUI APP DEVELOPMENT USING PYTHON!
DESKTOP GUI APP DEVELOPMENT USING PYTHON!DESKTOP GUI APP DEVELOPMENT USING PYTHON!
DESKTOP GUI APP DEVELOPMENT USING PYTHON!
 
DESKTOP GUI APP DEVELOPMENT USING PYTHON!
DESKTOP GUI APP DEVELOPMENT USING PYTHON!DESKTOP GUI APP DEVELOPMENT USING PYTHON!
DESKTOP GUI APP DEVELOPMENT USING PYTHON!
 

More from Ian5L3Allanm

please follow all instructions and answer the inbedded questions- and.pdf
please follow all instructions and answer the inbedded questions- and.pdfplease follow all instructions and answer the inbedded questions- and.pdf
please follow all instructions and answer the inbedded questions- and.pdf
Ian5L3Allanm
 
Please answer the following questions- Question #1- Which of the follo.pdf
Please answer the following questions- Question #1- Which of the follo.pdfPlease answer the following questions- Question #1- Which of the follo.pdf
Please answer the following questions- Question #1- Which of the follo.pdf
Ian5L3Allanm
 
Please follow the instructions carefully as there are some specific co (1).pdf
Please follow the instructions carefully as there are some specific co (1).pdfPlease follow the instructions carefully as there are some specific co (1).pdf
Please follow the instructions carefully as there are some specific co (1).pdf
Ian5L3Allanm
 
Please follow the instructions carefully as there are some specific co.pdf
Please follow the instructions carefully as there are some specific co.pdfPlease follow the instructions carefully as there are some specific co.pdf
Please follow the instructions carefully as there are some specific co.pdf
Ian5L3Allanm
 

More from Ian5L3Allanm (20)

Please write a C++ program to (1) Generate the following pattern using.pdf
Please write a C++ program to (1) Generate the following pattern using.pdfPlease write a C++ program to (1) Generate the following pattern using.pdf
Please write a C++ program to (1) Generate the following pattern using.pdf
 
please solve part (C) only- Thanks The following information was taken.pdf
please solve part (C) only- Thanks The following information was taken.pdfplease solve part (C) only- Thanks The following information was taken.pdf
please solve part (C) only- Thanks The following information was taken.pdf
 
Please provide a short answer to the image! Analyze this Karyotype as.pdf
Please provide a short answer to the image!  Analyze this Karyotype as.pdfPlease provide a short answer to the image!  Analyze this Karyotype as.pdf
Please provide a short answer to the image! Analyze this Karyotype as.pdf
 
Please illustrate the differences between Variable Costing system vers.pdf
Please illustrate the differences between Variable Costing system vers.pdfPlease illustrate the differences between Variable Costing system vers.pdf
Please illustrate the differences between Variable Costing system vers.pdf
 
please follow all instructions and answer the inbedded questions- and.pdf
please follow all instructions and answer the inbedded questions- and.pdfplease follow all instructions and answer the inbedded questions- and.pdf
please follow all instructions and answer the inbedded questions- and.pdf
 
Please answer it appropriately- I have already uploaded and the expert.pdf
Please answer it appropriately- I have already uploaded and the expert.pdfPlease answer it appropriately- I have already uploaded and the expert.pdf
Please answer it appropriately- I have already uploaded and the expert.pdf
 
please answer these two questions briefly thank you Examine Figures 1.pdf
please answer these two questions briefly  thank you Examine Figures 1.pdfplease answer these two questions briefly  thank you Examine Figures 1.pdf
please answer these two questions briefly thank you Examine Figures 1.pdf
 
Phonology- infants start to produce sounds as soon as they are born (c.pdf
Phonology- infants start to produce sounds as soon as they are born (c.pdfPhonology- infants start to produce sounds as soon as they are born (c.pdf
Phonology- infants start to produce sounds as soon as they are born (c.pdf
 
Phenylketonuria (PKU) is a autosomal recessive disorder in which a per.pdf
Phenylketonuria (PKU) is a autosomal recessive disorder in which a per.pdfPhenylketonuria (PKU) is a autosomal recessive disorder in which a per.pdf
Phenylketonuria (PKU) is a autosomal recessive disorder in which a per.pdf
 
Please answer the following questions- Question #1- Which of the follo.pdf
Please answer the following questions- Question #1- Which of the follo.pdfPlease answer the following questions- Question #1- Which of the follo.pdf
Please answer the following questions- Question #1- Which of the follo.pdf
 
Please help me solve this problem entirely - I really appreciate it- T (5).pdf
Please help me solve this problem entirely - I really appreciate it- T (5).pdfPlease help me solve this problem entirely - I really appreciate it- T (5).pdf
Please help me solve this problem entirely - I really appreciate it- T (5).pdf
 
Please help me solve the above 2 questions- I will drop a thumbs up fo.pdf
Please help me solve the above 2 questions- I will drop a thumbs up fo.pdfPlease help me solve the above 2 questions- I will drop a thumbs up fo.pdf
Please help me solve the above 2 questions- I will drop a thumbs up fo.pdf
 
Please help me i will give good rating Hanan works for a Korean multi.pdf
Please help me i will give good rating  Hanan works for a Korean multi.pdfPlease help me i will give good rating  Hanan works for a Korean multi.pdf
Please help me i will give good rating Hanan works for a Korean multi.pdf
 
Please answer the following questions thoroughly- 1) What are the m.pdf
Please answer the following questions thoroughly-    1) What are the m.pdfPlease answer the following questions thoroughly-    1) What are the m.pdf
Please answer the following questions thoroughly- 1) What are the m.pdf
 
photosythesis - chromatography paper- separation of photosynthetic pig.pdf
photosythesis - chromatography paper- separation of photosynthetic pig.pdfphotosythesis - chromatography paper- separation of photosynthetic pig.pdf
photosythesis - chromatography paper- separation of photosynthetic pig.pdf
 
Please follow the instructions carefully as there are some specific co (1).pdf
Please follow the instructions carefully as there are some specific co (1).pdfPlease follow the instructions carefully as there are some specific co (1).pdf
Please follow the instructions carefully as there are some specific co (1).pdf
 
Please follow the instructions carefully as there are some specific co.pdf
Please follow the instructions carefully as there are some specific co.pdfPlease follow the instructions carefully as there are some specific co.pdf
Please follow the instructions carefully as there are some specific co.pdf
 
Please explain what this means -The overall model was statistically si.pdf
Please explain what this means -The overall model was statistically si.pdfPlease explain what this means -The overall model was statistically si.pdf
Please explain what this means -The overall model was statistically si.pdf
 
Please draw an evolutionary tree dthe information given- 3- A new or.pdf
Please draw an evolutionary tree dthe information given-   3- A new or.pdfPlease draw an evolutionary tree dthe information given-   3- A new or.pdf
Please draw an evolutionary tree dthe information given- 3- A new or.pdf
 
Please complete the following App using Parallel Arrays- -- -- Conte.pdf
Please complete the following App using Parallel Arrays-  -- --  Conte.pdfPlease complete the following App using Parallel Arrays-  -- --  Conte.pdf
Please complete the following App using Parallel Arrays- -- -- Conte.pdf
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

Please complete and post the screenshots here- I can be reached at pra.pdf

  • 1. Please complete and post the screenshots here. I can be reached at practicals.lab at G mail as I won't be able to comment, or explain here because this platform does not provide end users that access. PYTHON PROGRAMMING DEFENSIVE SCRIPTING Preconditions: - VM Environment - Two Host Systems: Windows 10 Professional and Kali Linux. - VM Environment - Two Target Systems: Windows 7 and Metasploitable (Linux). - The internet available. - Python installed. Task 1: Write a python script (code) and launch it from the HOST: Windows 10 Professional (VM) to discover and remedy as many vulnerabilities as possible on TARGET: Windows 7 system (VM). In addition to the pip-audit tool, use three additional compatible open-source tools to load into the V M environment from host systems to target systems to identify vulnerabilities and remediate the vulnerabilities found. Briefly explain the specific purpose of the three additional compatible open-source tools, packages, etc. you have chosen beyond the basic python used to launch python script from the host system to the target that will identify and remedy vulnerabilities. Task 2: Write a python script (code) and launch it from the HOST: Kali Linux (VM)to discover and remedy as many vulnerabilities as possible on TARGET: Metasploitable system (VM). In addition to the pip-audit tool, use three additional compatible open-source tools to load into the VM environment from host systems to target systems to identify vulnerabilities and remediate the vuinerabilities found. Briefly explain the specific purpose of the three additional compatible open-source tools, packages, etc. you have chosen beyond the basic python used to launch python script from the host system to the target that will identify and remedy vulnerabilities. Outcomes 1. Screenshots of both written scripts. 2. Both target systems must be scanned and remediated. 3. Screenshots of vulnerabilities and remediations. 4. Host systems must be used to launch scans and follow-on activities remediation. 5. Identify what tasks will be done with Python scripts. 6. A description of all THREE tools, packages, etc., beyond basic Python, used to complete the tasks.