In: Computer Science
i want Solution From Question Number 5 Solution Of questions 1-4
in Previou Post
Note (I Want ScreenShot For Solution)
Use Kali Linux Commands to show me the following:
1. Who are you?
2. Change directory to Downloads
3. Make a new directory
4. Make a new text file under your name (Ghada.txt)
5. Write a paragraph about Cyber security (4 to 5 sentences)
>>simply open the file and write
inside it
6. Change the permission to be 764
7. Open the file but with a cyber security match Show me each and
every step with figure
b. Enter into Portswagger lab (Username enumeration via subtly
different responses)
https://portswigger.net/web-security/authentication/password-based/lab-username-enumerationvia-subtly-different-responses
Show me step-by-step how to use burp to get the username and
password. Name the username list
with your name ex. Ghada_usename.txt and
Ghada_password.txt
Use Seed Machine (the same SQL injection website)to conduct SQL
Injection such that:
1. Update Boby nickname to be your name (by Alice)
2. Update Boby password to be (your name as a password) (by
Alice).
Answer 1 - 4
******************
Answer 5
**************
Answer 6
**************
Grep will find out the word between double-quote words
Answer 7
*************
Thanks