Preview

Lab 1

Satisfactory Essays
Open Document
Open Document
690 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 1
Attack and Penetration Plan

Table of contents

1
Scope

2
Goals and Objectives

2
Tasks

2
Reporting

2
Schedule

2
Unanswered Questions

2
Authorized Letter

2

SCOPE
Located on ASA_Instructor, the e-commerce Web Application server is acting as an external point-of-entry into the network:
Ubuntu Linux 10.04 LTS Server (TargetUbuntu01)
Apache Web Server running the e-commerce Web application server
Credit card transaction processing occurs
GOALS AND OBJECTIVES
Perform a penetration test on the company’s production e-commerce Web application server and its Cisco network.
TASKS
Pre-engagement Interactions
Architecture Review
To help the penetration testing team understand the intended functionality of the targeted system and asses the security risks at a vulnerability could pose to the organization
Planning, Scoping and Recon

Intelligence Gathering
Network Survey (Nmap)
Identify domain names
Identify server names
Identify internet service provider
Identify IP address of host involved and create a network map using the nmap tool
Determine domain registry
Determine operating system
Scanning
Network sweeps
Network tracing
Port scans
Threat Modeling/Vulnerability Detection
Identifying exploits and vulnerabilities www.nessus.org Determine manual Vulnerability
Identify Targets
Name machines for testing (by function)
Properly Identify Targets
Estimate time for completion of test
Exploitation/Perform Penetration Test
Exploitation
Server side escalations
Client-side escalations
Testing methods
Password Cracking
Social Engineering
Test physical security
Wireless and Web attacks
Establish Security Posture
Initial baseline configuration
Continuous security monitoring
Remediation

REPORTING
Overview of the penetration test
Analysis on critical vulnerabilities
Commentary on critical vulnerabilities
Summary of any successful penetration

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Compare the portions that address Internet and e-mail access of at least three different companies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1 1

    • 814 Words
    • 9 Pages

    Using the example in Figure 1-5 and the steps that followed, create a binary conversion for the decimal value 200.…

    • 814 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Lab 5

    • 2594 Words
    • 10 Pages

    In gymnosperms, pollination is the transfer of pollen (Fig. 2) from male cones (where pollen is produced) to female cones, which house eggs. In these plants, pollen is carried from male cones to female cones by wind - gymnosperms were the first plants to evolve that did not need free water to transfer sperm to egg, and were therefore able to thrive in terrestrial habitats. Pollen grains are also protected by tough coats. After fertilization, seeds are produced with developing embryos…

    • 2594 Words
    • 10 Pages
    Good Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    The shielding also makes the cable heavier and stiffer. Thus, it is more difficult to handle.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 12

    • 441 Words
    • 3 Pages

    2. Use your procedure to find g on Planet X. Show your data, graphs, and calculations that support your conclusion.…

    • 441 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 3

    • 789 Words
    • 4 Pages

    To predict caloric expenditure you can plug in a measured heart rate and calculate the predicted VO2 (L/min). Then using the predicted VO2 and an estimated thermal equivalent (4.825 kcal/LO2), you can estimate the caloric expenditure. Nonetheless, each individual’s heart rate varies. These can be attributed to gender differences, physical activity and physical training. So, if the person is of the same gender and is as healthy as you are and does the same amount of exercise then it could be possible to use their regression line to estimate your own caloric expenditure however the limitations would be possibly the difference in size of the lungs for the estimation of VO2 max. Weight would be important, as it is required to calculate the predicted caloric expenditure. However if your weight can be misleading because one can simply weigh more because they are taller, not because they are bigger. Height does not play such an important role. When you are taller, your body does need to pump more blood throughout the body. This means that they will pump more blood per beat but not that they would have a higher heart rate. It is important to remember that a linear relationship exists between…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 1

    • 576 Words
    • 3 Pages

    There may be more than one answer but choose only one answer for each section. Please enter 1-26 in space provided.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    1.List four cell structures that were common to both plant and animal cells. (4 points)…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    lab 1

    • 1137 Words
    • 7 Pages

    I know I haven’t passed the lab 1 H and B but I really do not want to lose points again just for the fact I didn’t get it done in time. I already lost -5 pts and I really don’t want to lose -20 pts.…

    • 1137 Words
    • 7 Pages
    Powerful Essays