Preview

Lab 2 Performing A Vulnerability Assessment Worksheet

Good Essays
Open Document
Open Document
652 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2 Performing A Vulnerability Assessment Worksheet
Assessment Worksheet
Performing a Vulnerability Assessment
CSS150-1502A-02 : Introduction to Computer Security
Course Name and Number: _____________________________________________________
Johnathan McMullen
Student Name: ________________________________________________________________
Stephen Osborne
Instructor Name: ______________________________________________________________

Lab Due Date: ________________________________________________________________
Overview
In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them.
You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings.
Lab Assessment Questions & Answers
1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.
Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethicalcan hacking process.
2. Which application be used to perform a vulnerability assessment scan in the

reconnaissance phase of the ethical hacking process?
. OpenVAS (Greenbone Security Assistant). Vulnerability assessment tools are typically used to complete the scanning and vulnerability assessmentphase once the network mapping scanis completed 3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?
You must obtain written authorization to perform an intrusive,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Nessus is an application built for network discovery of devices and the operating systems and software running on them. This is a policy definition of it. IT is a free program that can be downloaded but donations are accepted. IT is also an open source program so people are constantly improving it.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    A(n) ____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    It's enough to keep a network administrator busy all day and worrying all night. Windows Vista can help with all of these scenarios, with enhanced network security features that are comprehensive yet easy to configure.…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    NETW202 W1 Lab Report

    • 927 Words
    • 5 Pages

    In your own words, summarize what you have learned concerning network commands available within the Windows operating system.…

    • 927 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Create daily incremental backups of data, and have back up equipment ready to be installed…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Computer Name, OS, Security Settings for Windows Firewall, Drives, Running Programs, and Installed Programs and Versions.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of…

    • 362 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Operating systems with networking capability have a fifth essential manager called the Network Manager that provides a convenient way for users to share resources while controlling users’ access to them.…

    • 1262 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Android Wifi Apps

    • 833 Words
    • 4 Pages

    The Android Network Toolkit is an complete tool kit for the pentesters , where hackers can find expolots using the mobile and penetrate or attacks the ip's according to their vunerabilities.…

    • 833 Words
    • 4 Pages
    Good Essays