Question: HOW TO DO TESTING (MAPPING AND SCANNING): Mapping the target environment and conducting a vulnerability scan PROJECT SECTION 2 DETAILS : The second part of

HOW TO DO TESTING (MAPPING AND SCANNING): Mapping the target environment and conducting a vulnerability scan

PROJECT SECTION 2 DETAILS: The second part of your project has two parts. You may choose either Project Lab Option ("Local Lab" or "Remote Lab") below to complete the following requirements:

  • Part A: Identifying the target system through network discovery using at least two network discovery/mapping tools (e.g., Nmap, Netdiscover, Arp-scan, etc.) to identify networks and targets. Identify what ports, services, and versions of software are running in the network environment.
  • Part B: Additionally, you will need to complete a vulnerability scan against your target host to identify vulnerabilities that you can then use to exploit to gain administrative/root access in the following project section

Option 1 - Local Lab

Choose any of the tools within your chosen Attack VM (Kali, Parrot OS, etc.) to map your network following the Part A requirements

Choose any vulnerability scanning software to download, install and configure (Open VAS, Nessus, etc.) complete Part B. You should be able to find free "personal/home use versions)." Configure a scan to run against your target host. If your target host is a deliberately vulnerable machine, you should find plenty of "critical/high" vulnerabilities to choose for your attack in the following project section.

Option 2 - Remote Lab

You may choose to complete this portion of the project using the Infosec Learning Lab "Remote and Local Exploitation." No software downloads are required, so just configure your tools and complete the scans. Follow the requirements in the Project Section 2 Details.

The project is submitted in a graded report in Week 8, complete with screenshots from these parts of the project. To stay on track, start Part 2 of the Project this week. Your choice, but don't put it off as it would be difficult to catch up and is a significant part of your final grade.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!