Preview

SEC450 Security Testing Lab Document

Satisfactory Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC450 Security Testing Lab Document
Student Name _________________________________ Date _____________
SEC450 Security Testing - iLab1
Objectives
In this lab, the students will examine the following objectives.

Discover network vulnerabilities and mitigation of possible threats
Learn the use of Access Control List (ACL) to implement mitigation

Scenario
A small company is using the topology shown below. Minimal security measures have been implemented. Possible vulnerabilities need to be discovered in any of the devices used in the network architecture. This includes routers, switches, and workstations.

Topology

The last page of the Lab Assignment document contains a full-page Topology. Remove this page and use it for reference to the topology and the IP addresses.

Initial Configuration
Routers’ Routing Protocols, FastEthernet and Serial interfaces used for the lab have been correctly configured and enabled. Unused interfaces have been shutdown. The RIP routing tables are complete for all routers and hosts. No ACLs have been applied to any of the routers. Below is the running-config file in Dallas router.

version 12.3(4)T7
!
hostname Dallas
!
interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0
!
interface FastEthernet0/1 ip address 192.168.10.1 255.255.255.0 shutdown
!
interface Serial0/0 bandwidth 1544 ip address 192.168.30.1 255.255.255.0 shutdown
!
interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0
!
router rip network 192.168.100.0 network 200.100.10.0
!
ip default-network 200.100.10.0 ip route 0.0.0.0 0.0.0.0 serial0/1
!
! line con 0 line aux 0 line vty 0 4 password cisco line vty 5 15 password cisco
!
end
Lab Data Collection and Submission
Download and open the lab document file: SEC450_SecurityTesting_Report.docx. Enter your name and date at the top of the lab document. As you complete each task of the lab assignment, entering the commands and, answering questions (as specified in the iLab assignment) into this

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    Refer to the exhibit. The network in the exhibit is fully operational. What two statements correctly describe the routing for the topologythat is shown? (Choose two.)…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The genome4u is a scientific study project at a large university that is intended to provide an order of the genomes of a hundred thousand volunteers. This genome lab setup has various amounts of routing protocols, in which the task would be getting the protocols interlinked so that design can be changed. The different Cisco switches represent the various VLANs that can be configured for the different project teams in the lab (Oppenheimer, 2005). Router-EIGRPs are the internal routers of the research lab network. Router-EIGRP/OSPFs and Router-EIGRP/RIPs are the routers that are at the Fundraising office interface and the Biology lab interface respectively. The file servers are where the volunteer’s data files will be stored. The design will now spread apart similar data to travel across it from different internet connections.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 3 Ilab

    • 827 Words
    • 3 Pages

    To complete the Week 3 Lab Report, answer the questions below concerning the Network Design Lab Scenario linked from Step 2 of the iLab page.…

    • 827 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CIS590: Project Plan Paper

    • 4496 Words
    • 18 Pages

    Addressing the need for a network topology that will address security, resiliency and business continuity challenges both day-to-day and in the event of a man-made (i.e., hacker) or natural (earth quake) disaster.…

    • 4496 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Sec 340 Final Exam

    • 1870 Words
    • 8 Pages

    If you lose your Internet connection during your Final Exam, log in again and try to access your Final Exam. If you are unable to enter the Final Exam, contact first the help desk and then your instructor.…

    • 1870 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    ddfdwqdewqrfqwrf

    • 1724 Words
    • 7 Pages

    Each lab in this manual requires that you answer questions, take screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab12_worksheet.docx. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to your instructor for review. As you perform the exercises in each lab, open the appropriate worksheet file, fill in the required information, and save the file to your flash drive.…

    • 1724 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Itech3214 Sample Exam

    • 319 Words
    • 2 Pages

    Define Electronic Commerce Applications in the context of organisational benefit - Your answer should be one to two paragraphs in length and should contain an example.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Laboratory Safety Manual

    • 72943 Words
    • 292 Pages

    at Oklahoma State University, as required by Title 29 Code of Federal Regulations Part 1910, Subpart Z,…

    • 72943 Words
    • 292 Pages
    Powerful Essays
  • Powerful Essays

    Uml Lab Manual

    • 8495 Words
    • 34 Pages

    Is a language. It is not simply a notation for drawing diagrams, but a complete…

    • 8495 Words
    • 34 Pages
    Powerful Essays
  • Powerful Essays

    Xlri Exam Solution

    • 17312 Words
    • 70 Pages

    Before the Test: 1. DO NOT REMOVE THE SEAL OF THIS BOOKLET UNTIL THE SIGNAL TO START IS GIVEN. 2. Keep only a pencil, eraser and sharpener with you. DO NOT KEEP with you books, rulers, slide rules, drawing instruments, calculators (including watch calculators), pagers, cellular phones, stop watches or any other device or loose paper. These should be left at a place indicated by the invigilator. 3. Use only HB pencil to fill in the Answer Sheet. 4. Enter in your Answer Sheet: (a) in Box 3, the Test Form Number that appears at the bottom of this page, (b) in Box 4, the Test Booklet Serial Number that appears at the top of this page. 5. Ensure that your personal data have been entered correctly on Side - II of the Answer Sheet. 6. Ensure that you have entered your 8-digit Test Registration Number in Box 2 of the Answer Sheet correctly. Start entering the number from the leftmost cell, leaving the last three cells blank. At the start of the Test: 1. As soon as the signal to start is given, open the Test Booklet. 2. This Test Booklet contains 21 pages, including the blank ones. Immediately after opening the Test Booklet, verify that all the pages are printed properly and are in order. If there is a problem with your Test Booklet, immediately inform the invigilator. You will be provided with a replacement. How to answer: 1. This test contains 75 questions in three sections. There are 25 questions in Section I, 25 questions in Section II and 25 questions in Section III. You have two and half hours to complete the test. In distributing the time over the three sections, please bear in mind that you need to demonstrate your competence in all three sections. 2. Directions for answering the questions are given before each group of questions. Read these directions carefully and answer the questions by darkening the appropriate circles on the Answer Sheet. Each question has only one correct answer. 3. All questions carry 4 marks…

    • 17312 Words
    • 70 Pages
    Powerful Essays