Reference no: EM132339067
Create a report based on lab.
PENETRATION TEST REPORT (PROJECT 2) INSTRUCTIONS
Overview
In this project you will utilize the information obtained from labs 4, 5, 6, and 7 to create a penetration test report.
Inputs:
1. Lab 4 outputs
2. Lab 5 outputs
3. Lab 6 outputs
4. Lab 7 outputs
5. Course textbook - Walker
6. Other external resources (i.e. NIST 800-115, PTES, Sans)
Instructions:
1. Assume that you are a security consultant that was hired to conduct a penetration test for company X*. You will be presenting this report to the management team and technical team.
*This is the company that you selected to conduct passive reconnaissance on (Lab 2).
2. Use the provided penetration testreport template.
3. Select three of the vulnerabilities that were exploited in your labs to report to the client (i.e. Shellshock exploited to gain remote access to Linux server, MS08-067 exploited and information gathered that lead to Domain Administrator access, Egress policy exploited on internal Windows system to establish remote command and control).
4. Import screenshots and descriptions where appropriate in the report.
5. Properly cite sources and include in reference page.
Book
Walker, M. (2014). CEH: Certified Ethical Hacker exam guide. New York: Mcgraw-Hill Education.
Lab 4: Linux Exploitation
Lab 5:Windows Exploitation
Lab 6: Client-Side Exploitation with Social Engineering
Lab 7: Evasive Maneuvers and Post Exploitation
Attachment:- Penetration Test Report Instructions.rar
Attachment:- Lab Reports - Ethical Hacking.rar