Reference no: EM133999868
Introduction
This is an individual assignment. You will perform structured reconnaissance using the provided artifacts to discover sensitive information, active services, and potential weaknesses. Also, you have to produce a professional report for an IT manager that documents what you analysed, what you found, and practical mitigations.
Important: You must only use the supplied artifacts. Attempting to scan or probe live systems is strictly forbidden and will be treated as academic misconduct.
Case Scenario
You have been engaged as a security tester for a mid-sized organisation. Management has asked you to perform a reconnaissance phase. Because no live lab is provided, we have supplied a set of captured artifacts (network scans, DNS outputs, and service enumeration logs). Use only these artifacts as your evidence sources. No AI shortcuts — Get genuine assignment help from experienced, real tutors.
Required Tasks (complete all three)
1. Footprinting (passive discovery from artifacts)
Review the provided OSINT and DNS artifacts and identify useful intelligence such as subdomains, DNS misconfigurations, or leaked emails.
Produce a short memo-style summary of the key intelligence you discovered and why it matters.
2. Port scanning & service discovery (artifact analysis)
Analyse the supplied nmap scan outputs to identify active hosts and services, service versions, and any clear misconfigurations.
Summarise which hosts and services are present and any obvious misconfigurations or out-of-date services.
3. Enumeration (artifact analysis)
- Review the enumeration logs (SMB listings, web directory listings, banner grabs) and list sensitive information (shared folders, exposed files, software versions).
- Base your analysis only on the supplied artifacts.
Rules of Engagement (RoE)
You are authorised to use the provided artifacts only. No live scanning or testing of external systems is permitted. Keep all working files until marking is complete.
Student Instructions for using artifacts
You will be provided with an 'Artifacts' folder containing pre-captured outputs. Use these files as your evidence base:
- nmap_scan_targetA.txt : Simulated nmap output for host 10.20.30.5
- dig_dns_lab.txt : DNS records and AXFR attempt output
- enum4linux_targetA.txt : SMB enumeration output
- web dir listingsample.txt : Web directory listing
- banner_grab_example.txt : Banner grab output
Reference these files directly in your report (e.g., 'See nmap_scan_targetA.txt - port 80 open').
Smoke Test
Open nmap_scan_targetA.txt and confirm that port 80 is listed as open for 10.20.30.5. This confirms you have the correct artifact package.
Quick Cheat-sheet (for reference only)
- To interpret nmap: look for ports with 'open' and note service/version lines.
- For dig output: look at AUTHORITY and A records to identify hosts and subdomains.
- For enum4linux output: look for 'Sharename' listings.
- For web directory listings: note sensitive filenames.
- Always reference the artifact filename in your report.