DESCRIPTION To perform a security vulnerability assessment (VA) and penetration testing (PT) on the two identified systems (Windows and Debian Linux), document the VA and PT findings and provide a remediation plan to the customer. Description: The security tester should follow the standard process of VA and PT, document the test results, and align the process to the below mentioned stages: Information Gathering and Reconnaissance Scanning and Enumeration Vulnerability Assessment Exploitation Analysis and Reporting Tools required: Kali Linux, Windows 10, and Debian System Expected deliverables: The customer leadership team is expecting two types of reports from the security testing organization: Executive report: The customer wants a short report with a summary of the assessment and key risks, findings from the executive dashboard, and areas of improvement. The report should be non-technical and comprehend the risk view if exploited. This audience for the report is the senior leadership of the customer organization. Technical report: This report is intended for sharing with the customer’s technical team. The objective of the report is to provide details: Vulnerabilities identified Exploitable and non-exploitable vulnerabilities Exploitation evidence (screenshot and proof-of-concept video) Remediation suggestions
DESCRIPTION To perform a security vulnerability assessment (VA) and penetration testing (PT) on the two identified systems (Windows and Debian Linux), document the VA and PT findings and provide a remediation plan to the customer. Description: The security tester should follow the standard process of VA and PT, document the test results, and align the process to the below mentioned stages: Information Gathering and Reconnaissance Scanning and Enumeration Vulnerability Assessment Exploitation Analysis and Reporting Tools required: Kali Linux, Windows 10, and Debian System Expected deliverables: The customer leadership team is expecting two types of reports from the security testing organization: Executive report: The customer wants a short report with a summary of the assessment and key risks, findings from the executive dashboard, and areas of improvement. The report should be non-technical and comprehend the risk view if exploited. This audience for the report is the senior leadership of the customer organization. Technical report: This report is intended for sharing with the customer’s technical team. The objective of the report is to provide details: Vulnerabilities identified Exploitable and non-exploitable vulnerabilities Exploitation evidence (screenshot and proof-of-concept video) Remediation suggestions
“I was not happy with the last answer, I need the copy-paste answer. I don't have the time to do it on my own or else I wouldn't have bought Chegg membership wasting 800RS just to do the answer on my own. Please give me Copy paste answers so I can be done with my Assessment. I will follow steps on Kali given by you and take screen shots required. Thanks Hoping for a Whole answer,please don't dissapoint I don't have much time... Please”
Trending now
This is a popular solution!
Step by step
Solved in 3 steps