Question: Lab #4 - Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation Course Name and Number: ______________________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ________________________________________________________________

Lab #4 - Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation

Course Name and Number: ______________________________________________________________

Student Name: ________________________________________________________________

Instructor Name: ________________________________________________________________

Lab Due Date: ________________________________________________________________

Lab Assessment Questions & Answers

1. What are the five steps of ethical hacking?

2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?

3. What step in the hacking attack process uses Zenmap?

4. What step in the hacking attack process identifies known vulnerabilities?

5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service?

6. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtain from the owners of the system in question prior to compromising and exploiting the known vulnerability?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!