Question: For PT Assignment 5, you will pretend as if you completed each of these labs as part of penetration testing against your PT target. In
For PT Assignment 5, you will pretend as if you completed each of these labs as part of penetration testing against your PT target. In other words, in this assignment, you will pretend as if the labs 7.4.5 - 7.4.9 in which you scanned for vulnerabilities on different operating systems/types of systems will be applied to your target. Imagine your PT target has the systems/appliances covered in these labs: a Windows workstation (Lab 7.4.5), Linux Server (7.4.6), Domain controller (7.4.7), Security Appliance (7.4.8), and WAP (7.4.9).
In this assignment, you will begin to create a document where you discuss each of the vulnerabilities you located (in the labs), and make recommendations to your target for what should be done to secure these vulnerabilities.
Create a document in which you summarize in 1-3 sentence your findings.
For each vulnerability you identify, name it, provide a description, provide information on how this vulnerability can be exploited, and describe what could happen (consequences) if an attacker exploited this vulnerability.
Consider the following attributes as you assess the seriousness of each vulnerability, and rate each one HIGH, MEDIUM, or LOW risk, and briefly (1 sentence) explain your rating.
Confidentiality: (can attacker access information that should not be disclosed, and if so, how much?)
Integrity: (can attacker modify system files or information, and if so, how much?)
Availability: (can an attacker reduce performance of system or interrupt availability of this resource, and if so, how much?)
Access Complexity (how skilled does an attacker need to be, or how much special access would they need, in order to exploit this vulnerability
Finally, after you have done all of these steps for each vulnerability, provide recommendations to your target (the company or organization you selected) on what should be done in order to secure these vulnerabilities.
Be sure to include photos and as much details as possible, and when your document is complete,
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
