Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Vulnerability Exploitation: Discuss the steps that were taken for the exploitation .Please provide the configuration of the script or the settings of the tool. To
Vulnerability Exploitation: Discuss the steps that were taken for the exploitation .Please provide the configuration of the script or the settings of the tool. To receive full credit for the exploitation, you need to show system -level access ,root-level access ,or admin -level access Testing Detail: You need to show elevated access. If you cannot show root (or privileged access ). choose another vulnerability. Run the following commands on the target machine once you have fully compromised it: 0 id 0 hostname 0 run the hostname command on the compromised machine and then re-run the hostname command (see figure below ) o whoami 0 One of the following commands :[ifconfig ]| [ipconfig ] Figure 1 Evidence of Exploitation 0 Risk Assessment :Use this area to discuss what the risk represents to an organization. Would it change the risk if it were on a public -facing server as opposed to an internal server ? What happens if this exploit were successful ? Assume that the vulnerable software would be installed in a business environment. not your home lab network . Discuss the a few different risks that would be dependent on where and how the vulnerable software would be installed across the organization Mitigation and Security Control Recommendation :Discuss how you fix this vulnerability. Can you patch it? Are there additional security controls , protections , or sensing mechanisms that could be installed to lessen the impact of an attack
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started