CNS 388 Security Testing and Assessment

Assignment Help Computer Network Security
Reference no: EM132470854

CNS 388: Security Testing and Assessment - DePaul University

The objective of the final lab is to use the skills, techniques, and tools you have learned in this course to obtain a set of flags (hints) and compromise all the systems of our mock company by performing a penetration test. You will need to use everything from nmap scans and DNS zone transfers to Metasploit and some ingenuity to accomplish this goal.

Scope
Our mock company's name is DePaulSecLabs, Inc. with the domain name cns388corp.depaulseclabs.com. The starting network range for our company is 10.12.student#.0/24. Do not scan any internet systems (aka not in the 10.0.0.0/8 range)as they are not part of this exercise and are most likely out-of-scope infrastructure. You do not need to do any recon on this on the public internet, it IS NOT a real company.

Company name- DePaulSecLabs, Inc.

Starting IP range - 10.12.student#.0/24 (all live systems reside in this range)

Out of Scope - 10.12.student#.254 (do not attack this IP, it is network infrastructure)

Domain name - cns388corp.depaulseclabs.com

Procedures
Throughout this lab, and as you complete tasks, you will obtain flag files (most of which can be cat'd out to a terminal screen, some will need to be downloaded). The flags will be in the following format: CNS-1234-AAAA.

Your first hint is here:

You know the IP range of our company, now scan it with nmap to map the environment (remember, it is everything in 10.12.student#.0/24). How many systems are live, what ports and services are open? If you find a web server, examine it to get the first hint...

As you compromise the systems, you will notice that you may have some powerful access to these systems. With power comes responsibility. Just like a real customer environment, be careful what modifications you make to the systems. You don't want to lock yourself (or your customers) out of their own boxes. Since I'm tracking what you do and when, both on the Kali box as well as the systems you're compromising, you should probably be honest if you make a mistake.

Attachment:- Security Testing and Assessment.rar

Reference no: EM132470854

Questions Cloud

Examples of mary requirements that are outside the scope : You are a support worker who has been assigned to work with Mary, a 73-year old lady who is a new client in your organisation. As you approach her
Illinois healing art malpractice statute : It specifically states the requirements of a health care professional to be an expert witness &.or opinion on the Standard of Care. Indicate what these are.
Role boundaries affect your personal development : How do the responsibilities and limitations you have to work within your work role boundaries affect your personal development?
What health assessment information is required : What health assessment information is required for a diagnosis of this patient?
CNS 388 Security Testing and Assessment : CNS 388 Security Testing and Assessment Help and Solution, DePaul University - Homework Help - compromise all the systems of our mock company by performing
Difference between weak and strong paternalism : Explain the difference between weak and strong paternalism. Give examples
How your nurse leader preceptor influences work environment : Describe how your nurse leader preceptor influences the work environment. Consider how influence protects and values others in the work environment.
How does the theory help to meet clas standards : How does the theory help to meet CLAS standards to advance health equity?
Importance of trust in a nurse-patient counseling : How can this relationship motivate a patient toward health promotion? What are some strategies to faster trust in a counseling relationship?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd