IT395_ERIC_CLARKSON_UNIT_3_ASSIGNMENT

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

395

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

11

Uploaded by BarristerRiverRook47

Report
1 Unit 3 Assignment IT395 Certified Ethical Hacking II Eric Clarkson Purdue Global University Professor Donald McCracken September 12, 2023
2 I have successfully executed the instructions for acquiring the Metasploitable Virtual Machine and have configured the settings to optimize its functionality. The significance of Metasploitable 2 in the realm of ethical hacking is paramount, as it provides a secure and supervised platform for security professionals to refine their skills and tools. By utilizing Metasploitable 2, professionals can accurately pinpoint and address vulnerabilities in real-world scenarios, subsequently enhancing their knowledge and expertise to develop stronger and more secure systems. I have taken the mandated screenshots for the assignment, which are accessible below.
3 Screenshot of ifconfig print out.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Screenshot of the bottom of the printout showing the Traceroute and host scan time.
5 What ports were open and how long did the scan take? I have completed scanning the Windows 10 virtual machine and I am happy to inform you that the results are now available. Upon thorough analysis, I have detected a total of 5 open ports. These ports have been identified as port numbers 135, 139, 445, and 5357. I was able to complete the scan in a mere 74.66 seconds, which indicates that the process was swift and efficient.
6 Part 2: Questions Respond to the following: 1. Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum. Because of the presence of several operating systems, networks, including small office/home office (SOHO) networks, are frequently termed mixed networks in current times. This is because different devices require distinct operating systems, which can lead to compatibility concerns if not properly managed. A typical home, for example, may contain a variety of devices that run different operating systems, such as PCs, smartphones, and tablets. Some of these devices may be Windows-based, while others may be Mac- or Linux-based. Linux or its derivatives, such as Ubuntu or Raspberry Pi, are widely used in devices such as smart home hubs, routers, and network-attached storage (NAS) devices. Linux's popularity might be ascribed to its open-source nature, which allows it to be widely flexible and adaptable to various devices. Linux is also well-known for its security and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 stability, making it a popular choice for systems requiring high levels of dependability and security. Linux-based devices are popular not just in commercial applications, but also in do-it- yourself projects. The Raspberry Pi, for example, is a popular single-board computer that can be used for a range of DIY projects, such as creating a home security system or a smart thermostat. Furthermore, Linux-based devices are frequently employed in the development of media centers, smart home automation systems, and other inventive DIY projects. To summarize, most networks, especially small office/home office (SOHO) networks, are mixed networks because they contain devices that run multiple operating systems. Because of its open-source nature, security, and reliability, Linux and its derivatives are extensively utilized in devices such as smart home hubs, routers, and NAS systems. Furthermore, because of their variety and simplicity of customization, Linux-based devices are popular in DIY projects such as establishing a home automation system or a media center. 1. How are Unix/Linux and the Apple OS X related? 200 words minimum. Unix/Linux and Apple OS X are two of the most popular operating systems in the world. Despite their apparent contrasts, they share several similarities worth studying.
8 To begin, it is important to note that OS X is built on top of Unix, therefore they have a similar command-line interface and file system. Furthermore, many of the same tools and utilities present in Unix, such as the Terminal application, are included in OS X. Unix/Linux and OS X both use a similar method of software management. Package managers, such as apt-get or yum, are used in Unix/Linux to install and manage software. Similarly, software in OS X is normally installed and managed using the App Store. Finally, Unix/Linux and OS X are known for their reliability and security. The architecture of Unix/Linux and its stringent permissions system makes it extremely safe and stable. Similarly, OS X's Unix roots and Apple's emphasis on security make it a robust and safe operating system. In conclusion, despite their obvious differences, Unix/Linux and Apple OS X share significant similarities. Unix/Linux and OS X have a lot in common, from their similar architectures and software management methodologies to their reputation for being secure and stable platforms. 1. Explain how Zenmap can be used to enumerate vulnerabilities. 100 words minimum.
9 Zenmap is an incredibly robust and versatile tool that is specifically developed to uncover potential network vulnerabilities. It offers a variety of scanning tools, including TCP connect scans, UDP scans, and ping scans, allowing you to explore the network and find any potential weak areas that attackers could exploit. One of Zenmap's main features is its graphical interface, which makes it simple to examine and analyze the results of your scans. This interface allows you to swiftly discover any irregularities or inconsistencies in the network while also offering a full description of any detected possible vulnerabilities. Another useful feature of Zenmap is its ability to automate the enumeration process through the use of script scans. This helps you to identify possible weaknesses quickly and without the need for manual intervention. You may dramatically minimize the time and resources required to discover and remedy any security vulnerabilities by automating this process. Overall, Zenmap is an invaluable tool for any security professional wanting to improve the security of their network. Its comprehensive scanning capabilities, combined with its easy-to- use interface, make it an excellent solution for anyone who wants to find and address network problems.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 References Difference between Linux and MACOS . (2020, July 9). GeeksforGeeks.  https://www.geeksforgeeks.org/difference-between-linux-and-macos/ Difference between UNIX and Linux - javatpoint . (n.d.). www.javatpoint.com.  https://www.javatpoint.com/unix-vs-linux Home Applications of Linux-Based Operating Systems . (2023, June 24). turbofuture.com.  https://turbofuture.com/computers/Home-Applications-of-Linux-Based- Operating-Systems Lynch, M. (2023, June 8).  SOHO routers and networks explained . The Tech Edvocate.  https://www.thetechedvocate.org/soho-routers-and-networks-explained/ McKay, D. (2019, October 21).  Is MACOS UNIX? (and what does that mean?) . How-To Geek.  https://www.howtogeek.com/441599/is-macos-unix-and-what-does-that-mean/ Mitchell, B. (2021, July 16).  How SOHO routers and networks differ from ordinary ones . Lifewire.  https://www.lifewire.com/soho-routers-and-networks-explained-3971344 Ot, A. (2023, April 25).  How to scan for vulnerabilities with Nmap (Steps & definition) . Enterprise Storage Forum.  https://www.enterprisestorageforum.com/security/nmap- vulnerability-scan Prokopets, M. (2022, May 10).  The ultimate manual for Nmap vulnerability scanning . Nira.  https://nira.com/nmap-vulnerability-scanning/
11 Small office/Home Office LANs (Networking) . (n.d.). what-when-how â?? In Depth Tutorials and Information.  https://what-when-how.com/networking/small-officehome-office-lans- networking/ What are the advantages and disadvantages of using Nmap for network mapping and enumeration?  (n.d.). LinkedIn.  https://www.linkedin.com/advice/0/what-advantages- disadvantages-using-nmap-network