Exam
Full name *
1) What is SSH ? *
2) What is the port number for SSH ? *

3) You got access to another machine by ssh. What will you be able to do?

*

4) What is the wireshark used for ?

*

5) CVE is a Common Vulnerabilities and Exposures

*

6) What is Nessus?

*

7) Which commend do we use to know what’s your ip address ?

*

8)Put by order the steps to hack a machine .
A)
Finding a vulnerability
B)
Gathering information/scanning
C)
Exploit

*

9) What is a Metasploit

*

10) How to start Metasploit on your debian/kali linux machines

*

11) while you are in metasploit , How to select an exploit , and how to check the options , how to edit the options( for example RHosts )and how to execute . 

*
Just write the commands

12) What the command “who” do ?

*

13) If I want to install net-tools on Debian machine. What command should I use?

*

14) If we have a file and we should edit it. What command we should use?

*

15) What command we should use to only read it

*

16) What command we should use to create a file

*

17) How to scan an IP address and check the version of the port 

*

18) What the commend "pwd" do ?

*
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy