Student Name _________________________________ Date _____________ SEC450 Security Testing - iLab1 Objectives In this lab‚ the students will examine the following objectives. Discover network vulnerabilities and mitigation of possible threats Learn the use of Access Control List (ACL) to implement mitigation Scenario A small company is using the topology shown below. Minimal security measures have been implemented. Possible vulnerabilities need to be discovered in any of the devices used in the
Premium Routing IP address Subnetwork
SEC450 Dallas Router Security Audit Lab Document NOTE: Use Carriage Returns and Page Breaks as needed to prevent table contents from extending across page boundaries. Task 1: Run the Security Audit using NetDoctor * Go to Appendix A at the end of the NetDoctor report. Copy and paste the Appendix A page into your lab document the table cell below:. Paste Appendix A Here Appendix A: All Rules and SummariesAdministrationEXEC Passwords Not Using Type 5 Encryption (1 note)User Account
Premium Computer network IP address Internet Protocol
Student Name Rolando Salas Date 8/10/14 SEC450 Database Traffic Load Lab Report NOTE: Use carriage returns and page breaks as needed to prevent table contents from extending across page boundaries. Task 1—Set up Database Traffic Flows For Socket information‚ the protocol will be TCP and the Source port will be set to sqlnet – Oracle. When you have completed the traffic configuration‚ capture the Traffic Generator window () as shown below and paste (V) it into the table cell provided
Premium Serial communication Graphical user interface
Student Name: Rolando Salas Date: 8/3/14 SEC450 Wireless Roaming iLab Report Task 1—Configure DES Global and Node Statistics Under Node Statistics‚ select Data Traffic Received (bits/sec) and Throughput (bits/sec). Capture a copy of the completed Choose Results dialog ( ) and paste it into your lab document. Task 2—Run the Discrete Event Simulation Use to capture a copy of the Simulation Execution dialog shown below and paste it into your lab document. Task 3—Analyze the
Premium Transmission Control Protocol
Student Name Luis A Mejias Date 4-06-2014_ SEC450 Database Traffic Load Lab Report NOTE: Use carriage returns and page breaks as needed to prevent table contents from extending across page boundaries. Task 1—Verify Initial Connectivity Between Router and Hosts Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC. Use the IP addresses indicated on the network topology page. Select the commands
Premium Graph theory Graphical user interface Serial communication