Question: This is my first security course, please help me with solving this question penetration testing and reporting Activity scenario/Description: - Scenario: It is a 'Blind'
penetration testing and reporting Activity scenario/Description: - Scenario: It is a 'Blind' penetration testing scenario. You are provided with an asset detall (IP address of the server) and asked to do the assessment over it. Reporting details are below: - Document vulnerabilities that you are able to successfully exploit on the server. - Describe in detall what you did and what level of access you were able to obtain. If you obtain a user account with limited privieges, document whether you were able to escalate the privileges to root. - Document each exploit that you are able to launch successtully. - Document potentially sensitive information that you are able to obtain from the server. These could include user files, web, database, or server files. - Recommendlargue for methods that could protect the vulnerabilities and sensitive information from > exploitation. Reporting guidelines: - Penetration test reports should include vulnerability findings, exploit activities and recommendations for mitigation - Vulnerability findings should be categorized and referenced appropriately with CVE notation - Exploit activities should be documented with enough details so that they are reproducible. - Mitigation recommendations should be prioritized and include risk reduction and security enhancement recommendations as applicable. insturetions on submission: 1. submit the report in MSWord format. 2. The assignment can be at most taken by 2 members team. 3. clearly mention you names and IDs on the submission. 4. one team member submits it
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
