Reference no: EM133842671
Ethical Hacking and Penetration Testing
Assessment: Reconnaissance and Vulnerability Report
Report on Reconnaissance and Vulnerability on an Enterprise Application.
Introduction
In this individual assignment, students perform network discovery techniques using NMAP with Kali, BackBox or Parrot to target at least one enterprise applications per student (e.g. Zabbix, Greylog, or any other open source/evaluation software) to determine which ports are open and what types of traffic are expected on those ports. Describe and implement how to harden the system. Students should use a two or three-factor method (e.g. Wireshark and Netcat to determine if a port is open) to interpret their results and determine attack vectors for the enterprise software. Students should record the hash of files generated by the software and observe events triggered by the software and think of possible attack vectors that might exist. You can use any tool(s), such as NMAP, Port Scanners, Wireshark, Netminer, windows event viewer, logs, etc. It is beneficial to learn new tools such as Sandboxes. Place Your Order Now!
Report
Cover Page: Name, Student ID, Subject Code.
Executive Summary
Introductions
Methods and Evidence
Interpretation and Recommendations
Conclusions
Appendix