Performing_a_Vulnerability_Assessment_4e_-_Tyjaha_Steele
pdf
keyboard_arrow_up
School
University of South Carolina, Aiken *
*We aren’t endorsed by this school
Course
255
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
7
Uploaded by tyjahasteele
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
Student:
Email:
Tyjaha Steele
tnsteele@usca.edu
Time on Task:
Progress:
1 hour, 45 minutes
20%
Report Generated:
Saturday, September 23, 2023 at 1:38 PM
Section 1: Hands-On Demonstration
Part 1: Scan the Network with Zenmap
9.
Make a screen capture
showing the contents of the
Ports/Hosts tab from the SYN scan for
fileserver01.securelabsondemand.com
.
Page 1 of 7
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
15.
Make a screen capture
showing the contents of the
Host Details tab from the OS scan for
fileserver01.securelabsondemand.com
.
19.
Make a screen capture
showing the details in the
Ports/Hosts tab from the Service scan
for fileserver01.securelabsondemand.com.
Part 2: Conduct a Vulnerability Scan with Nessus
Page 2 of 7
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
14.
Make a screen capture
showing the
Nessus report summary
.
Part 3: Evaluate Your Findings
11.
Summarize
the vulnerability you selected, including the CVSS risk score, and
recommend
a
mitigation strategy.
The vulnerability that I chose to focus on for this assignment was the "SSL Certificate Cannot be
Trusted" which is based upon the SSL certificate which establishes a secure and encrypted
connection between a individual's browser and a web server. When this certificate cannot be verified
or trusted, it opens the door for individuals with malicious intent to intercept and access data
transmitted between the browser and the server because it is no longer encrypted. The CVSS risk
score for this vulnerability is a 6.4-6.5 (Medium). Some reasons that these certificates will show as
expired is when it has expired, there are invalid signatures, or when the authority of the certificate
cannot be recognized. Some ways that those issues can be resolved is to install or update the
certificates, configure the certificates and check their expiration, verify the domain match, and perhaps
even go a step further and implement HTTP Strict Transport Security so user's are unable to access
your site over an insecure connection.
Page 3 of 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
Section 2: Applied Learning
Part 1: Scan the Network with Nmap
6.
Make a screen capture
showing the
results of the traceroute command
.
Incomplete
10.
Make a screen capture
showing the
results of the Nmap scan with OS detection
activated
.
Incomplete
Part 2: Conduct a Vulnerability Scan with OpenVAS
13.
Make a screen capture
showing the
detailed OpenVAS scan results
.
Incomplete
Part 3: Prepare a Penetration Test Report
Target
Insert the target here.
Incomplete
Completed by
Insert your name here.
Incomplete
On
Insert current date here.
Incomplete
Page 4 of 7
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
Purpose
Identify the purpose of the penetration test.
Incomplete
Scope
Identify the scope of the penetration test.
Incomplete
Summary of Findings
Identify and summarize each of the three high-severity vulnerabilities identified during your penetration
test. For each vulnerability, identify the severity, describe the issue, and recommend a remediation.
Incomplete
Conclusion
Identify your key findings.
Incomplete
Page 5 of 7
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
Section 3: Challenge and Analysis
Part 1: Scan the Domain Controller with Nmap
Make screen capture
showing the
results of your targeted port scan on the domain controller
.
Incomplete
Part 2: Scan the Domain Controller with Nessus
Make a screen capture
showing the
Nessus report summary for the domain controller
.
Incomplete
Part 3: Prepare a Penetration Test Report
Target
Insert the target here.
Incomplete
Completed by
Insert your name here.
Incomplete
On
Insert current date here.
Incomplete
Purpose
Identify the purpose of the penetration test.
Incomplete
Page 6 of 7
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Performing a Vulnerability Assessment (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 02
Scope
Identify the scope of the penetration test.
Incomplete
Summary of Findings
Identify and summarize each vulnerability identified during your penetration test. For each
vulnerability, identify the severity, describe the issue, and recommend a remediation.
Incomplete
Conclusion
Identify your key findings.
Incomplete
Powered by TCPDF (www.tcpdf.org)
Page 7 of 7