Find any four cases of system vulnerabilities in any systems ( XP, Windows Server , Linux ) using appropriate Ethical hacking techniques such as foot-printing, scanning (NMAP), vulnerability scanning( OPEN_VAS) Deliverables: o NMAP scanning report o Foot printing report What Vulnerability found What is the appropriate exploit to be used

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Your task
You are required to:
Find any four cases of system vulnerabilities in any systems ( XP, Windows Server , Linux ) using
appropriate Ethical hacking techniques such as foot-printing , scanning (NMAP), vulnerability
scanning( OPEN_VAS)
Deliverables:
NMAP scanning report
Foot printing report
What Vulnerability found
What is the appropriate exploit to be used
Perform the attack and gain access using appropriate tools in the KALI
Deliverables
Find and use the appropriate tool in the KALI to gain access
Using the access try some exploitation techniques in the target system (File creation, Activate
Camera, Screen Shot)
How to remove the attackers attack signature (Clearing the tracks) to escapee from the forensic
study
Your recommendation to mitigate the attack
Transcribed Image Text:Your task You are required to: Find any four cases of system vulnerabilities in any systems ( XP, Windows Server , Linux ) using appropriate Ethical hacking techniques such as foot-printing , scanning (NMAP), vulnerability scanning( OPEN_VAS) Deliverables: NMAP scanning report Foot printing report What Vulnerability found What is the appropriate exploit to be used Perform the attack and gain access using appropriate tools in the KALI Deliverables Find and use the appropriate tool in the KALI to gain access Using the access try some exploitation techniques in the target system (File creation, Activate Camera, Screen Shot) How to remove the attackers attack signature (Clearing the tracks) to escapee from the forensic study Your recommendation to mitigate the attack
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 2 images

Blurred answer
Knowledge Booster
Primary components of process planning
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education