3) You got access to another machine by ssh. What will you be able to do?
4) What is the wireshark used for ?
5) CVE is a Common Vulnerabilities and Exposures
6) What is Nessus?
7) Which commend do we use to know what’s your ip address ?
8)Put by order the steps to hack a machine .A)Finding a vulnerabilityB)Gathering information/scanningC)Exploit
9) What is a Metasploit
10) How to start Metasploit on your debian/kali linux machines
11) while you are in metasploit , How to select an exploit , and how to check the
options , how to edit the options( for example RHosts ), and how to execute .
12) What the command “who” do ?
13) If I want to install net-tools on Debian machine. What
command should I use?
14) If we have a file and we should edit it. What command
we should use?
15) What command we should use to only read it
16) What command we should use to create a file
17) How to scan an IP address and check the version of the
18) What the commend "pwd" do ?