Preview

Lab 2 Answers Nessus

Satisfactory Essays
Open Document
Open Document
628 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2 Answers Nessus
Laboratory #2

Lab #2: Perform a Vulnerability Assessment Scan Using Nessus®
(Nessus® is a Registered Trademark of Tenable Network Security, Inc.)

Learning Objectives and Outcomes
Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in an IP network infrastructure using ZenMap GUI (Nmap) to perform an IP host, port, and services scan * Perform a vulnerability assessment scan on a targeted IP subnetwork using Nessus® * Compare the results of the ZenMap GUI “Intense Scan” with a Nessus® vulnerability assessment scan * Assess the findings of the vulnerability assessment scan and identify critical vulnerabilities * Make recommendations for mitigating the identified risks, threats, and vulnerabilities as described on the CVE database listing

Lab #2 – Assessment Worksheet
Perform a Vulnerability Assessment Scan Using Nessus®

Course Name & Number: Information Security System IS433

Student Name: Anh N Bien

Instructor Name: Rich Fesl

LAB Due Date: 1/29/2013

Overview This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.

Lab Assessment Questions & Answers

1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    Analyze a mixed-version Microsoft Windows environment and identify the issues described in Microsoft Security Advisories.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ceh Cheat Sheet

    • 3910 Words
    • 16 Pages

    Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records…

    • 3910 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    3. What applications and tools can be used to perform this initial reconnaissance and probing step?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    7. Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microsoft Windows platforms, what would you do to identify known software vulnerabilities and exploits?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is my report on why I believe that it is important to protect our Windows and Unix/Linux servers from known vulnerabilities. As I am sure you know, there are many different types of attacks on servers/network systems today. Throughout this report, I will illustrate a few of the more recently known/discovered vulnerabilities on both the Windows and Unix/Linus servers.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The use of computers in this generation has been a necessity. A lot of companies depend on computers to operate their business which is why it is essential to learn the different threats that other people could use to attack their business. New technologies are on the rise these days and the knowledge that people have about computers can be accessed easily on the internet. Different kind of hackers can get access to people’s computers easily with the necessary knowledge and devices. People need to be aware of these kinds of threat and help them by preventing their computers or networks of being hacked. Hackers today uses ping sweeps and port scans to gain access to networks. Learning how ping sweep and port scans are utilized can help us protect ourselves from these hackers.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Highly skilled to work in IT Risk Management as IT Risk assessment specialist, manage vulnerability assessment and compliance to discover the vulnerabilities and make sure the platforms under PCI standard on internal and external applications on environment and high experience to solve it with best solutions to achieve PCI-DSS. Vulnerability Assessment plan: -Symantec CCS-VM. -Nessus. -Ripd7 Nexpose. Test Compliance: -Symantec CCS compliance Penetration Test plan: -Ripd7 Metasploit. -Backtrack 5 r3 and Kali Linux. -PT website code Netsparker 2.x Monitoring and Tracing: -HP arcsight -Symantec SIM File Integrity monitoring: -nCircal -Symantec CSP Highly skilled to manage Security and Network projects and take appropriate decisions throughout project lifecycle according PMI standard. Experienced in development and integration for IT network and security solutions. Excellent experience in Cisco, Fortinet, Juniper technologies. Adopting an innovative and analytical approach to technical troubleshooting and issue resolution. Has the ability to motivate and lead high performing teams to overachieve targets. Training courses: IT: - ITIL Foundation Certificate in IT Service Management V3 Security: - ComTIA Security+.…

    • 1079 Words
    • 5 Pages
    Satisfactory Essays