George Mason University CYSE 230 Laboratory Exercise 5 – IP and MAC Spoofing 1. Overview For this lesson, students will use the Cyber Range: Kali Linux with Metasploitable (2018) environment to complete IP spoofing, MAC spoofing. Students will also use the Kali and Vulnerable Windows (64bit) VMs environment to complete and examine a MITM ...[Show More]
Category: | |
Number of pages: | 7 |
Language: | English |
Last updated: | 9 months ago |
Downloads: | 0 |
Views: | 3 |