This website uses cookies to ensure you have the best experience. Learn more

Lab #1 Assessment Essay

668 words - 3 pages

Lab #1 – Attack & Penetration Test Plan
Answer Sheet
Hacking and Countermeasures
6/28/2013
MR. Walker
Ramon B Kreher
Jared Long

Part 1: Table of Contents
1. Introduction
2. Authorization
3. Preliminary
4. Scope
5. Goals & Objectives
6. Test Plan Reporting
7. Test Plan Reporting
8. Projecting Plan and Schedule

Part 2: Sample Authorization Letter
The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any ...view middle of the document...

List of testing times:
Start time | End time | Start time | End Time |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |

7. Devices to Avoid:
Device Name | IP Address | POC | Additional Identifiers |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |

Network/Server Penetration Test Questions
1. IPs to be attacked
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |

2. Network Diagrams available Yes | No (please circle one)
Location: (Security Consulting Use only) |
|
|
|
|
|
|
|

3. Test Credentials: (fill in as many as needed)
Username | Password |
| |
| |
| |
| |
| |
| |
| |

4. List of Test Exceptions (tests not to be performed)
|
|
|
|
|
|
|
|

5. List of testing times:
Start time | End time | Start time | End Time |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |

Part 4: Scope of Penetration Test Plan
The purpose of this penetration test is to identify and report Vulnerabilities, Threats, exploits, and risks to the specified network and E-Commerce sites. Any of the specified devices that have not been specified in the exceptions list shall be tested with the methods specified in the statement of work.

Part 5: Goals & Objectives of the Penetration Test Plan
* Identify Vulnerabilities and Threats to the system.
* Verify Legal Compliance with Federal, State, and local laws regarding IT.
* Recommend potential remediation...

Other Papers Like Lab #1 Assessment

Blank Essay

258 words - 2 pages © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date

Common Lab Tasks Essay

2403 words - 10 pages in this tab includes the assessment questions for this lab. They are included as a deliverable for every lab. It is recommended that you review these questions prior to performing the hands-on steps. Assessment Figure 3 Lab Navigator 1. In the left pane, click each tab to familiarize yourself with the content of the lab before proceeding with the Hands-on Steps. 2. Click the Intro tab to begin the virtual lab. © 2014 by Jones & Bartlett

Chapter 5

272 words - 2 pages level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level. Lab Assessment Questions & Answers 1. Why would a network administrator use Wireshark and NetWitness Investigator together? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol

Information Systems Security

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Lab 1 Performing Reconnaissance and Probing

518 words - 3 pages Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Principals of Information Assurance CIS2350 Course Name and Number: _____________________________________________________ Shane Grogan Student Name: ________________________________________________________________ Timothy Pintello Instructor Name: ______________________________________________________________ Unknown Lab Due Date

Applying Owasp to a Web Security Assessment

589 words - 3 pages Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business functions and each security practice of OpenSAMM. 1) Governance 2

Construct A Linux Host Firewall And Monitor For Ip Traffic

665 words - 3 pages running on the Linux desktop. By defining what IP traffic is allowed and what IP traffic is denied, you implemented another layer of security in your overall layered security strategy. In addition, you explored some useful network management and security operation tools, which can be enabled to monitor your IP traffic and security functions. Lab Assessment Questions & Answers 1. Briefly explain how the Gufw internal Ubuntu host IP stateful

Test

379 words - 2 pages desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? 2. Of these three fundamental controls, which two are used by the Domain

: Ab #1 Fundamentals of Information Systems Security

661 words - 3 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Fundamentals of Information Security Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the

Assessment 4

600 words - 3 pages : ________________________________________________________________ Overview In this lab, you explored the Open Web Application Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business

Accounting

5581 words - 23 pages . Answer all the questions. Submission Requirements Microsoft Word. 1-2 pages. Self-Assessment Checklist I followed the directions in the lab manual for all exercises. | * | I submitted answers to all of the questions for this lab. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft Word (.doc /.docx)Length: 1-2 pagesFont: Times New Roman 12 point

Related Essays

Is4560 Lab 1 Assessment Essay

1248 words - 5 pages Lab 1 Assessment Worksheet Develop an Attack & Penetration Plan 1. List the 5 steps of the hacking process. * Reconnaissance * Scanning * Gaining Access * Maintaining Access * Covering Tracks 2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be

Is3440 Unit 1 Lab Assessment Sheet

503 words - 3 pages were (or were not) running. Lab Assessment Questions & Answers 1. During the Minimal install, NTP (Network Time Protocol) server was not installed. From a security perspective, why is it important for a system to keep accurate time? To keep the system in sync and up to date for logging purposes such as any incidents that occur. Otherwise a time may not be correct when checking logs for an incident. 2. During the install, you set a

Nt2580 Lab 1 Nt2580 Lab 1 Lab #1 Assessment Worksheet

599 words - 3 pages A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components: Computer systems (nodes or hosts). Network devices that enable connectivity (such as hubs, switches, and routers). The transmission medium provides a path for electrical signals between devices. Network interfaces are devices that send and receive electrical signals

Monkeys Essay

307 words - 2 pages Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap