Question: This is my first security course, please help me with solving this question penetration testing and reporting Activity scenario/Description: - Scenario: It is a 'Blind'

 This is my first security course, please help me with solving
This is my first security course, please help me with solving this question

penetration testing and reporting Activity scenario/Description: - Scenario: It is a 'Blind' penetration testing scenario. You are provided with an asset detall (IP address of the server) and asked to do the assessment over it. Reporting details are below: - Document vulnerabilities that you are able to successfully exploit on the server. - Describe in detall what you did and what level of access you were able to obtain. If you obtain a user account with limited privieges, document whether you were able to escalate the privileges to root. - Document each exploit that you are able to launch successtully. - Document potentially sensitive information that you are able to obtain from the server. These could include user files, web, database, or server files. - Recommendlargue for methods that could protect the vulnerabilities and sensitive information from > exploitation. Reporting guidelines: - Penetration test reports should include vulnerability findings, exploit activities and recommendations for mitigation - Vulnerability findings should be categorized and referenced appropriately with CVE notation - Exploit activities should be documented with enough details so that they are reproducible. - Mitigation recommendations should be prioritized and include risk reduction and security enhancement recommendations as applicable. insturetions on submission: 1. submit the report in MSWord format. 2. The assignment can be at most taken by 2 members team. 3. clearly mention you names and IDs on the submission. 4. one team member submits it

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!