Question: Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from
Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process. When conducting a vulnerability analysis of any type the tester should properly scope the testing for applicable depth and breadth to meet the goals and/or requirements of the desired outcome. For the PTES assignment this week, conduct a vulnerability analysis (including both screenshots and narrative analysis) using the tools of your choosing (many have been covered in the course and the program to date such as Zenmap) to conduct an analysis for a hypothetical or real-world client. You can also perform the analysis on a Windows target in your virtual environment. Try the analysis of the Windows target with and without the Windows firewall enabled. At a minimum, include the following: Active Port Based Service Based Banner Grabbing Web Server Version Research Analyze an OS hardening guide for a major operating system from the DoD @ http://iase.disa.mil/stigs/Pages/a-z.aspx (Links to an external site.)Links to an external site. and find a vulnerability that has been mitigated based on this hardening guide from the NIST vulnerability database https://nvd.nist.gov/vuln/search (Links to an external site.)Links to an external site.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
