In Project 1, the website administrator makes some misconfigurations and the hacker gets in Here is the scenario for Project 1: A recently hired website administrator maintains and manages multiple websites across the country. Their reputation is good, and they are relatively inexpensive. Mercury USA, the small company you work for, just hired them. Their contract states that they may only access the Windows system through RDP (Remote Desktop Protocol – 3389). You are their Forensic Analyst for Mercury USA. Your IT specialist provided the website administrator with an account with administrative access so they can change and update their settings. The website administrator has many sites to maintain. As a shortcut, they added a hidden folder to the website. Within that folder there is a file where they stored their credentials so they can easily access the system. No one should be able to find this hidden folder and the file with the credentials, since it is not indexed. And, just as an extra precaution, the website administrator encoded the password with Base64 encoding on the off chance that someone with a lot of time on their hands would figure out the hidden URL. An attacker who regularly scans websites with directory buster, or dirb (a built in Kali Linux tool), finds the hidden URL and then decodes the base64 password. Please provide below information Talk about the purpose of this project discuss Network intrusions idiocies any concerns or critical points related to this security incident Discuss the Linux system that you are using in MARS Discuss the Windows system that you are using in MARS Discuss what IIS is and its function in a few bullet points Discuss Password Policies and their benefit in a few bullet points Discuss the net localgroup command Explain how website misconfigurations can lead to security incidents Talk about the Tools and Technologies used Talk about what happened Talk about how the attacked got in. Conclusion