Report on reconnaissance and vulnerability

Assignment Help Computer Engineering
Reference no: EM133842671

Ethical Hacking and Penetration Testing

Assessment: Reconnaissance and Vulnerability Report

Report on Reconnaissance and Vulnerability on an Enterprise Application.

Introduction

In this individual assignment, students perform network discovery techniques using NMAP with Kali, BackBox or Parrot to target at least one enterprise applications per student (e.g. Zabbix, Greylog, or any other open source/evaluation software) to determine which ports are open and what types of traffic are expected on those ports. Describe and implement how to harden the system. Students should use a two or three-factor method (e.g. Wireshark and Netcat to determine if a port is open) to interpret their results and determine attack vectors for the enterprise software. Students should record the hash of files generated by the software and observe events triggered by the software and think of possible attack vectors that might exist. You can use any tool(s), such as NMAP, Port Scanners, Wireshark, Netminer, windows event viewer, logs, etc. It is beneficial to learn new tools such as Sandboxes. Place Your Order Now!

Report
Cover Page: Name, Student ID, Subject Code.
Executive Summary
Introductions
Methods and Evidence
Interpretation and Recommendations
Conclusions
Appendix

Reference no: EM133842671

Questions Cloud

Employment setting or clinical setting : Analyze current trends within your employment setting or clinical setting. Identify aspects of complex patient needs that require early thinking
Cultural barriers may influence maternal-neonatal care : What cultural barriers may influence maternal-neonatal care? What are the two techniques for integrating culture into maternal-neonatal nursing care?
Discuss the rationale behind change based on your knowledge : MAN 4150- Discuss the rationale behind the change based on your knowledge and observation (why was it being done?).
Create sample population : Stratified random sampling enables researchers to create a sample population which represents the entire population of those they want to study.
Report on reconnaissance and vulnerability : ICT704 Ethical Hacking and Penetration Testing, Victorian Institute of Technology - Report on Reconnaissance and Vulnerability on an Enterprise Application
Your ambulatory care clinic with complaints : An 8-year-old girl comes to your ambulatory care clinic with complaints of left ear pain for the past 3 days.
What is role of asian culture in pain communication : Assessment of pain and the impact of culture on reporting pain. What is the role of Asian culture in pain communication?
Develop mutually agreed-on intervention goals and objectives : Develop mutually agreed-on intervention goals and objectives based on critical assessment of strengths, needs and challenges within clients and constituencies;
Create a flyer to use in a community outreach clinic : Create a flyer to use in a community outreach clinic with your teens and young adults. Please include references on a separate page.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd