logo

ICT287 Computer Security: Planet of the Grapes

   

Added on  2023-01-19

14 Pages2703 Words84 Views
Running head: ICT287 COMPUTER SECURITY
ICT287 Computer Security: Planet of the Grapes
Name of the Student
Name of the University
Author’s Note
ICT287 Computer Security: Planet of the Grapes_1
1
ICT287 COMPUTER SECURITY
Answer 1: Attack Surface Modelling
For performing the auditing, the image of the server machine is downloaded and
configured with host only adapter for assessing the attacking surface for the machine. The
analysis is done for analyzing the network level attacks and the physical attacks that can
compromise the security of the organization and incur a huge loss for the organization.
Downloading the VM
Network Interface Configuration
ICT287 Computer Security: Planet of the Grapes_2
2
ICT287 COMPUTER SECURITY
Assessing Network Level Attacks
For performing the network level attack, a scanning is needed to be made on the available
host connected in the network and it is done with the help of nmap. The scanning is done for
finding the ports that are currently open in the targeted machine and gain other information that
can be used for attempting to gain information form the system and reveal the common exploits
and vulnerabilities of the targeted host.
Since we do not know the password of the VM we cannot login to the virtual machine but
also we can find the software that are installed in it with the help of different software tools also
known as vulnerability scanner and identify the vulnerable service running on the machine that
ICT287 Computer Security: Planet of the Grapes_3
3
ICT287 COMPUTER SECURITY
can be used for intercepting and monitoring the traffic in then network and compromise the
network security.
Nessus is used for scanning the current vulnerability of the network and identify the
potential holes such as outdated software, open ports and use of default password on the devices.
The hacking of a local area network can be done easily with running a vulnerability scanner and
then running a penetration testing on the targeted machine connected in the local area network.
The test of the vulnerability is done by following two steps such as scanning the vulnerability for
revealing the possibility of the problem and performing a penetration testing for exploitation of
the possible problem. Nessus is used for performing the vulnerability testing and since its free
version offers different tools for exploring the network it is selected. It also helps to point
different tools for performing a penetration test in the network. For using the Nessus an online
account is needed to be created for getting an activation code and downloading the software.
After the completion of the installation the Nessus account is needed to set up and the sign up
process is needed to be completed. While connecting for the first time a warning of connect not
secure is displayed in the web browser and the advanced option is needed to be selected for
ICT287 Computer Security: Planet of the Grapes_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Penetration Testing and Intrusion Detection Name of the University Author
|57
|5094
|316

Penetration Testing Report 2022
|23
|1237
|18

Conducting Vulnerability on Windows XP-SP2 System using Nessus and Metasploit
|42
|2354
|77

Assignment on Network Analyzer
|22
|1370
|37

Analyzing Security Options for JKL Company
|12
|841
|51

Network Analyzer for Security Tools: Nessus and Nmap
|23
|1463
|224