CYB – Assignment

Use our book as a main reference:Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .Use our book as a main reference:Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Waltham, MA: Elsevier. .• Chapter 7: Post Exploitation and Maintaining Access with Backdoors, Rootkits, and MeterpreterUnit VII AssignmentNetcat: Transferring FilesUsing two virtual machines, set up a listener and send a file over the connection on port 1337.• On the receiving machine issue the following command:o nc -lp 1337 > NAME-OF-FILE or nc -lp 1337 > virus.exe.• Then, on the sending machine, issue the following command:o nc IP-ADDRESS-OF-TARGET 7777 < NAME-OF-FILE, ORo nc 172.16.45 1337 < virus.exeSubmit a screenshot of your results as a file upload for grading.