Preview

Lab #2

Satisfactory Essays
Open Document
Open Document
402 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab #2
32

LAB #2 | Perform a Vulnerability Assessment Scan Using Nessus

LAB #2 – ASSESSMENT WORKSHEET

Perform a Vulnerability Assessment Scan Using Nessus
Course Name and Number: Student Name: Instructor Name: Lab Due Date:

Overview
This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.

Lab Assessment Questions & Answers
1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this

type of application.

2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems

security throughout the seven domains of a typical IT infrastructure?

Assessment Worksheet
3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?

33

4. Before you conduct an ethical hacking process or penetration test on a live production network, what

must you do prior to performing the reconnaissance, probing, and scanning procedures?

2
Perform a Vulnerability Assessment Scan Using Nessus

5. What is a CVE listing? Who hosts and who sponsors the CVE database listing website?

6. Can Zenmap GUI detect which operating systems are present on IP servers and workstations? What would

that option look like in the command line if running a scan on 172.30.0.10?

7. If you

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    The most important step in the fi ve-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the Microsoft® Security Bulletin?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3. What must you obtain before you begin the ethical hacking process or penetration test on a live…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    3. Which application is used in step #2 in the hacking process to perform a vulnerability assessment scan? / Nessus…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This is to certify that the Research work incorporated in the report “Ethical and Unethical Hacking” a bonafide work done by Nikita Aurora, Arvin Tamboowalla, Aakash Mansukhani, Devangna Dossa and Nikita Sahota.…

    • 4335 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    This is why it is best if we outsource our vulnerability assessment project. Even though we know how to do an assessment, we will not know as much as a professional who do just that everyday. So, since this project is so critical it is best that we outsource it to an experience professional with a good reputation.…

    • 214 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The results of the scans should be compared against baseline scans so that any changes (such as new open ports or added services) will be investigated. Vulnerability scanning should be conducted on existing systems and particularly as new technology equipment is deployed; the new equipment should be scanned immediately and then added to the regular schedule of scans for all equipment. A vulnerability scanner serves to provide a “red flag” to alert personnel of a security issue. A vulnerability scan examines the current security in a passive method. It does not attempt to exploit any weaknesses that it finds; rather, it is intended to only report back what it uncovered. The types of weaknesses that it is searching for include identifying any known vulnerabilities, finding common misconfigurations, and uncovering a lack of security controls. Vulnerability scans are usually performed from inside the security perimeter and are not intended to disrupt the normal operations of the network or devices. These scans are conducted using an automated software package that examines the system for known weaknesses by passively testing the security controls. Because the automated software is conducting the test in a systematic fashion, a technician with only limited security experience could conduct the test. The resulting report, however, should be examined by trained security personnel to identify and correct any problems. There are several commercial as well as open source vulnerability scan software products available for large organizations. In addition, free products that provide users with scans of their local systems are popular. However, the free products may not always provide a comprehensive scan of an entire system. Because of the number of patch updates…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethical Hacker

    • 5200 Words
    • 21 Pages

    Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. If hacking involves creativity and thinking ‘out-of-the-box’, then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of ‘defense in depth’. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure. The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target. The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking…

    • 5200 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    their pursuit of information, so are we. The thrill of the hack is not in…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Ethical Hacking

    • 1018 Words
    • 5 Pages

    In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system 's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical.…

    • 1018 Words
    • 5 Pages
    Good Essays