Week2LabReport

docx

School

American Public University *

*We aren’t endorsed by this school

Course

422

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by Coder1984

Report
Lab 2 - Performing a Vulnerability Assessment ISSC422 American Military University Professor Remy Long
Part 1 Step 8 This scan identified the open ports in the Target IP addresses, this was completed after identifying which machines were available. I recommend trying to avoid having open ports without specific firewall rules to avoid intrusion via these ports. Part 1 Step 13
In step 13 we have completed a scan of the hosts to identify which OS is being used, this information can be used to insert malware into the host in order to gain control of the system. Part 1 Step 17 During step 17 a scan was performed to not only identify the operating system, but the correct version of the software. This information can be used to identify weaknesses in the operating system itself, once again this scan can be mitigated by controlling open ports with specific firewall rules put into place. High Risk Security Scans 172.30.0.07
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
As this high-risk report states there is a risk due to there being a flaw in the RDP Server, which makes this system vulnerable to a spoof attack from a remote user. I would recommend replacing this Operating system with a new one. As the vendor currently has no patches available.
172.30.0.11 This system has the same issue as the first, another workaround to this vulnerability is only connecting remotely to this system using a trusted connection. A VPN would be helpful in this situation.
172.30.0.12 The security issue for this host is the same as the previous two a flaw in the operating system could potentially allow for an attacker to gain information that would otherwise be protected. A patch for this issue is not likely so the recommendation to replace the os stands. 172.30.0.17
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
The issue with system is the fact that the security updates have not been performed. This can cause major holes in a system’s security as new malware will not be protected against. The SMB on this system is also vulnerable to a DoS attack, which will deny access to the system by authorized users. The recommendation to fix these issues is a simple software security patch update conducted by the system admin. Any users that have automatic security updates installed should not have to take any actions at this time.