Question: Phase 4 : A spreadsheet or document showing the risk analysis of the nine scenarios provided in the Capstone document under Phase 4 . The
Phase : A spreadsheet or document showing the risk analysis of the nine
scenarios provided in the Capstone document under Phase The following
information must be present:
Description of the vulnerability
Operating systemsversions affected
Risks of attempting to exploit eg might crash the host or lock out an
account
Risk what could you or a threat actor do upon successful exploitation
Identify as many attack vectors as you can. Examples: launch an attack
on internal systems, obtain password hashes, crack passwords, access
other systems, move laterally, and so on
Identify potential blocking mechanisms such as AV software or
IDSIPS and how you might try to bypass them.
Document how you plan on cracking passwords. This will depend of
course on the source system, but you should be ready for whatever you
run into. Include online tools as well.
Remediation action
CVSS score
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
