Which additional vulnerabilities you want to exploit

Assignment Help Computer Network Security
Reference no: EM133957652 , Length: 5 pages

Assignment:

Take a look at the example penetration testing report by Offense Security in the resources. Conduct a writeup similar in nature for the vulnerabilities we discovered today. This writeup must include images as seen in the example so that the customer can easily see what was found. Your paper must discuss each of the vulnerabilities we covered in this week's lab, as well as two additional vulnerabilities that we did not discuss.

In the resources section, you'll see a list of vulnerabilities in Metasploitable 3. Review this list to determine which additional vulnerabilities you want to exploit. When documenting these in your paper, you will need to document how you found this vulnerability. Do not state that you used a vulnerability listing for Metasploitable3. Instead, discuss the process used to identify the vulnerability (nmap scans to find open ports, Nessus to find vulnerability). Ensure that your paper revolves around the following scenario.

This week's discussion post had fellow peers make recommendations for your paper. Include any recommendations you believe could improve your paper.

Scenario:

Acme Corporation hired you to validate a new system added to its network. They believe this system is secure and ready to be added, but company policy requires a completed penetration test to verify security. The policy dictates that the penetration test be conducted first as a white-box test to ensure that the system can be completely verified. As such, the project manager at Acme Corp has provided you with the credentials to the box. This allows you not only to conduct an uncredentialed scan, but also a credentialed scan.

They want the test to start as if the hacker has access to the internal network, but does not know anything. As such, the test must start with only barebones information (you know the subnet you are on, but you do not know credentials). After you get an initial scan of the network using no credentials, they request that you use the provided credentials to get more accurate scans and more accurate testing.

Paper Requirements:

Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.

Narrative: The Narrative must start as if you do not know any username and password. As such, an uncredentialed scan must run, as well as nmap scans. After you get the initial uncredentialed scans, you must use the credentials to scan the VMs.

APA Formatting: Any resources and citations used are formatted according to APA 7th Edition.

Length: 3 to 5 Pages (not including Title Page, References, and any Abstract/Executive Summary)

Font and font-size: Any of the acceptable APA 7 fonts.

Vulnerabilities: 5 Vulnerabilities are discussed. Those that we found in the Lab this week, and two additional ones you discovered by yourself.

Reference no: EM133957652

Questions Cloud

What is the purpose of normalization : Personal opinion: What is the purpose of normalization? And why you think it's important?
Characteristic of online social networks : Which of the following is characteristic of online social networks? Which of the following is NOT an accurate description of modern marketing?
How organization foster culture that promotes consideration : How can organization foster a culture that promotes thoughtful consideration and open discussions about research rather than merely following evidence rankings?
Difference between interfile and intrafile clustering : What is the difference between interfile and intrafile clustering? Why are they used? Which one is effective? dont copy from internet.
Which additional vulnerabilities you want to exploit : You'll see a list of vulnerabilities in Metasploitable 3. Review this list to determine which additional vulnerabilities you want to exploit.
Marketing plan-promotion as part of your plan : What would happen to your marketing plan/strategy if you started with "promotion" as part of your plan?
What might the drawbacks be and how can you overcome them : Great work on this, Margaretta. I think understanding the hierarchy of studies is important. What might these drawbacks be, and how can you overcome them?
How does empathy play a role in managing an agitated patient : How does empathy play a role in managing agitated patient and what are some specific phrases or actions you use to convey empathy while keeping situation safe?
Definitions of appropriate and inappropriate behavior : How has the changes in technology affected the definitions of appropriate and inappropriate behavior?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd