Question
Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those
Every IoT device found with vulnerabilities, expand on 2 or more issues and discuss how to rectify the issues and how to improve on those not reoccurring again. Identify those vulnerabilities found and write on each based on the solution you suggest going forward.
Router: Hosts: 1 Vulnerabilities: 15 Scan Date: February 13 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 15 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Host Fully Qualified Domain Name (FQDN) Resolution, Nessus Scan Information, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided 2. Nintendo Switch: Hosts: 1 Vulnerabilities: 7 Scan Date: February 14 Vulnerability Categories: ICMP Timestamp Request Remote Date Disclosure, OS identification, Ping the remote host Top Threats: VPR Filter: 7 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: Ethernet Card Manufacturer Detection, Nessus Scan Information 3. Smartphone: Hosts: 1 Vulnerabilities: 5 Scan Date: February 14 Vulnerability Categories: Ethernet MAC Addresses, ICMP Timestamp Request Remote Date Disclosure, Nessus Scan Information, Ping the remote host, Traceroute Information Top Threats: VPR Filter: 5 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General 4. SmartTV: Hosts: 1 Vulnerabilities: 4 Scan Date: February 14 Vulnerability Categories: Ethernet Card Manufacturer Detection, Ethernet MAC Addresses, Nessus Scan Information, Ping the remote host Top Threats: VPR Filter: 4 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: Misc. 5. Laptop: Hosts: 1 Vulnerabilities: 17 Scan Date: February 15 Vulnerability Categories: SMB (Multiple issues), Microsoft Windows (Multiple issues), DCE Services Enumeration, Authenticated Check: OS Name and Installed Package Enumeration, Common Platform Enumeration (CPE), Inconsistent Hostname and IP Address, Ping the remote host, VMware ESX/GSX Server detection Top Threats: VPR Filter: 17 vulnerabilities Severity Levels: Critical, High, Medium, Low Device Type: General Info: SMB Signing not required, Asset Attribute: Fully Qualified Domain Name (FQDN), OS Identification, OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library), OS Security Patch Assessment Not Available, Target Credential Status by Authentication Protocol - No Credentials Provided February 20, 2023
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started