Computer Security

   

Added on  2023-01-17

19 Pages2531 Words97 Views
Running head: COMPUTERS SECURITY
Computer Security
Name of the Student
Name of the University
Author’s Note
Computer Security_1
1
COMPUTERS SECURITY
Table of Contents
1. Overview......................................................................................................................................2
2. Result Summary...........................................................................................................................2
3. Methodology................................................................................................................................3
3.1. Scope.....................................................................................................................................4
3.2. Information Gathering..........................................................................................................4
3.3. IP and MAC Address............................................................................................................5
3.4. Virtual Host..........................................................................................................................5
3.5. Scanning...............................................................................................................................6
3.5.1 Port Scan.........................................................................................................................6
3.5.2. Framework.....................................................................................................................8
3.5.3. Password Cracking........................................................................................................9
3.5.4 WEB Scan.....................................................................................................................13
4. Result and Recommendations....................................................................................................15
5. Bibliography..............................................................................................................................17
Computer Security_2
2
COMPUTERS SECURITY
1. Overview
Ethical hacking is mainly utilized in order to perform an attack on the entire virtual
machine of WindgetInc and for determining the various types of security weaknesses that are
mainly associated with the computer system and further helps in handling the entire attacked
environment. It is found that in order to perform test that are of different types of attack, both the
host and the result of the attack is generally observed in order to identify the weak point which
generally can compromise with the victim virtual machine flags which are generally used for
properly penetrating the root user or other normal user in order to exploit the various types of
configuration related issues and for identifying the desired vulnerability.
The entire report helps in elaborating the test longs, results as well as different types of
recommendations that are generally utilized in order to compromise the security based targeted
host.
2. Result Summary
It is found that in order to perform the penetration testing, the victim who is mainly
associated with the virtual machine is generally identified to be very much vulnerable to different
network attacks which are further related to authorization, authentication as well as proper access
control. It is analyzed that proper authentication with the help of non-plaintext like DIGEST-
MD5 is generally helpful in enhancing the possibility of the unauthorized access of the various
web application which generally create a negative impact on the user data that generally resides
within the database of the entire server. The various types of services which are generally present
for the various users that are required to be examined properly due to the utilization of encoders,
payloads, exploit, encoders as well as payloads. Furthermore, proper documented weakness of
Computer Security_3
3
COMPUTERS SECURITY
the security is generally utilized within the module in order to execute the arbitrary commands
for the various targeted victim that generally run on disc demon commands without properly
checking the authorization system.
It is found that the service that is generally named ProFTPD is mainly utilized in order to
enhance the FTP server as well as feature of the Apache configuration based syntax that further
contains various virtual as well as permission related FTP servers that are mainly utilized for
testing as well as for documenting the favourable output.
It is found that Kali Linux generally helps in offering various types of security tools that
are generally helpful in properly determining the issues as well as various types of vulnerabilities
that are associated with the host bypassing the security of the password, by cracking tools as well
as by recovering the password from the data that is generally stored. In addition to this, the
packages that are generally present within the Kali Linux is considered a mixture of various
types of cracking strategies as well as algorithm including dictionary attack as well as brute force
that is considered to be productive for penetration testing.
The vulnerability that is mainly associated with the web server is mainly testing in order
to determine the issues with software as well as server misconfiguration. It is found that proper
checking is generally done on the various default files as well as programs that are generally
outdated as well as vulnerable to various types of network based attacks.
3. Methodology
It is found that there are a number of steps that are generally needed to be performed for
stating the scope of vulnerability testing and it generally get ended with reporting of the output
test. It is found that a proper self-performing test is generally utilized with the various modes that
Computer Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security
|18
|3268
|86

Analysis of Security Vulnerability of WidgetsInc Virtual Machine Image
|23
|3636
|97

Metasploit Framework Assignment PDF
|26
|1193
|325

Identification of Threats using Nmap and Metasploit Network Security Tools
|9
|1788
|54

Use of Shellcode in Digital Forensics
|12
|2599
|309

Computer Forensics and Security Fundamentals Coursework 1
|8
|1546
|185