One of the two deliverables for that project is a brief screen capture video dem

One of the two deliverables for that project is a brief screen capture video demonstrating your exploitation of the exploit/category you select this week. In the video, you will describe the steps you took to penetrate the system and exfiltrate data. In Week 6, you will share your videos with your team in the discussion, and you will submit it for grading in Week 7.
Video Requirements
In your video, you will do a walk-though of the attack on the Linux system with your Kali box and explain how you were able to exploit the vulnerability as well as exfiltrate data. The video demonstration will be a powerful example of what occurs on an actual penetration test and will be an item that you can add to a portfolio.
Your video should show the steps involved in penetrating the client’s system. The video will be created with Microsoft Stream. The video should be a maximum of 10 minutes but should not be shorter than 5 minutes.
Include the following:
introduction and purpose
steps taken to break into the remote system and a discussion of the vulnerability you are exploiting
an explanation of how you accessed the shadow file and what methods you used to crack the password hash
an explanation of how you gained access to the confidential information on the system
a summary of the steps taken in the video and recommendations for the company.
use Microsoft stream for the video.
the written report should be a 3 page Microsoft Word document that contains relevant information about your penetration test of the client’s Linux machine.
you can use VM player work station (https://www.vmware.com/products/workstation-player/workstation-player-evaluation.html) to create the VM machines. I have also added the machines for you to download. please change the IP of Kali Linux to 10.4.2.50 and change the IP of metasploitanle to 10.4.2.100.
here is a link if how the video should look. https://leocontent.umgc.edu/content/umuc/tus/cmit/cmit386/2238/weeks/week-5/exploitation.html?ou=916864
kali is the attack machine and metasploitable is the victim machine.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount