Question: Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from

Vulnerability testing is the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process. When conducting a vulnerability analysis of any type the tester should properly scope the testing for applicable depth and breadth to meet the goals and/or requirements of the desired outcome. For the PTES assignment this week, conduct a vulnerability analysis (including both screenshots and narrative analysis) using the tools of your choosing (many have been covered in the course and the program to date such as Zenmap) to conduct an analysis for a hypothetical or real-world client. You can also perform the analysis on a Windows target in your virtual environment. Try the analysis of the Windows target with and without the Windows firewall enabled. At a minimum, include the following: Active Port Based Service Based Banner Grabbing Web Server Version Research Analyze an OS hardening guide for a major operating system from the DoD @ http://iase.disa.mil/stigs/Pages/a-z.aspx (Links to an external site.)Links to an external site. and find a vulnerability that has been mitigated based on this hardening guide from the NIST vulnerability database https://nvd.nist.gov/vuln/search (Links to an external site.)Links to an external site.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!