Question
Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from
Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process. When conducting a vulnerability analysis of any type the tester should properly scope the testing for applicable depth and breadth to meet the goals and/or requirements of the desired outcome. For the PTES assignment this week, conduct a vulnerability analysis (including both screenshots and narrative analysis) using the tools of your choosing (many have been covered in the course and the program to date such as Zenmap) to conduct an analysis for a hypothetical or real-world client. You can also perform the analysis on a Windows target in your virtual environment. Try the analysis of the Windows target with and without the Windows firewall enabled. At a minimum, include the following: Active Port Based Service Based Banner Grabbing Web Server Version Research Analyze an OS hardening guide for a major operating system from the DoD @ http://iase.disa.mil/stigs/Pages/a-z.aspx (Links to an external site.)Links to an external site. and find a vulnerability that has been mitigated based on this hardening guide from the NIST vulnerability database https://nvd.nist.gov/vuln/search (Links to an external site.)Links to an external site.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started