This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 4Metasploit
- 4penetration testing
- 2Kali Linux
- 2vulnerabilities
- 1Metasploit framework
- 1Metasploitable 2
- 1Ahuja, Puneet
- 1Ancha, Jyothi Sharmila
- 1Bagla, Navjot
- 1Bhusri, Sagar
- 1Bonagiri, Raja Venkata Sandeep Kumar
- 1Chauhan, Bhavyarajsinh
-
2021-06-01
Kolencheril, Jerbin Joy, Messerschmidt, Mitchell, Bhusri, Sagar, Kotha, Vamshidhar Reddy, Jawanda, Gurcharan, Thomas, Betsy Elsa, Bonagiri, Raja Venkata Sandeep Kumar, Shah, Aakash, Nallarala, Abhilash, Garg, Gaurav, Pathak, Isha, Saggu, Ravdeep, Doddaka, Sravya, Pole, Sparsha, Singh, Satinderpal, Vadlamudi, Tejaswini, Sethuraman, Vigneshwar, Vangala, Vishista, Kaur, Amritpal, Kaur, Parminder, Chittimalla, Sai Kumar, Chittimalla, Sandeep, Patel, Priyesha, Kirandeep, Singh, Mandeep, Joshi, Dhanvi, Pathan, Rahim Khan, Ancha, Jyothi Sharmila, Kaur, Amandeep, Bagla, Navjot, Thakur, Preeti, Pugalenthi, Subaveena, Garrapu, Tharun, Gummakonda, Anirudh, Soobhri, Pawan, Kaur, Simranbir, Ahuja, Puneet, Rathod, Divya, Varma, Upasana, Nadipineni, Pavan kumar, Vemuri, Keerthi Kishore, Maadeereddy, Amulya, Raikar, Akshata Rajendra, Sunkara, Leela Suresh, Mehta, Akshat, Heena, Kaur, Kiranjit, Shah, Anish Manishkumar, Elumalai, Sweatha, Joshi, Mansi, Chauhan, Bhavyarajsinh, Nellore, Rishab Kumar Singh, Lindskog, Dale
In recent years, the prevalent utilization of technology and web applications has given rise to security vulnerabilities. This problem has dramatically increased the demand for proposed security models and mechanisms. Organizations find it challenging to secure their web applications and find...
-
Exploiting the vulnerabilities on Metasploit 3 (Ubuntu) machine using Metasploit framework and methodologies
Download2020
A penetration test is also known as a pen test, pentest or ethical hacking. Penetration testing helps to secure networks and highlights the security issues. In this unit, investigate different aspects of penetration testing, including phases, tools, attack methodologies. More specifically, we...
-
2020
This unit focuses on penetration testing, and the main objective is to perform penetration testing on Metasploitable 3 to exploit vulnerabilities and to escalate privileges to administrator rights or higher. The primary purpose of this unit is to exploit Metasploitable 3 by taking reference from...