Reference no: EM133969458
Penetration Testing and Countermeasures
Tutorial 3: Desktop and Server OS Vulnerabilities
Part A: Windows Vulnerabilities
Activity 3.1 - Exploring Windows Updates and Misconfigurations
1. Boot into your Windows virtual machine (VM).
2. Go to Settings → Update & Security → Windows Update.
3. Check if updates are pending. Note down any missing updates.
4. Open Command Prompt and run:
- systeminfo - review OS version, patches installed, and hotfixes.
- net user - list user accounts and note if Guest account is enabled.
5. Write a short note: What vulnerabilities might exist if updates are missing or if unnecessary accounts are enabled?
Activity 3.2 - Password Policy Check
1. On the Windows VM, open Local Security Policy (type secpol.msc).
2. Under Account Policies → Password Policy, check:
- Minimum password length.
- Password complexity requirements.
- Account lockout threshold.
3. Compare the settings with best practices discussed in the lecture.
4. Write your observations: Would these settings be considered secure in a corporate environment?
Part B: Linux Vulnerabilities
Activity 3.3 - Checking for Updates
1. Boot into your Kali Linux (or Parrot/BackBox) VM.
2. Run the following commands:
- lsb_release -a - to see the Linux version.
- sudo apt-get update && sudo apt-get upgrade -s - simulate upgrade and check if packages are outdated.
3. Note down how many packages could be upgraded. Get dependable, budget-friendly assignment help-starting today!
4. Write a reflection: Why is keeping Linux updated essential for security?
Activity 3.4 - Samba Service Investigation
1. In your Linux VM, check if Samba is installed and running:
- systemctl status smbd
- netstat -tulnp | grep 445
2. If Samba is running, identify if it has any shared folders:
- smbclient -L localhost -U
3. Record what you find. Discuss why misconfigured Samba shares are dangerous.
Part D: Reflection Questions
Write short answers (2-3 sentences each):
Question 1. Why are null sessions considered a high security risk, even though they don't require a password?
Question 2. How can buffer overflow vulnerabilities be exploited in operating systems?
Question 3. Which is more challenging to secure in your opinion: Windows OS or Linux OS? Why?
Question 4. What are two best practices you would recommend for hardening OS systems in a real organization?