Reference no: EM133828167
Assignment: Vulnerability Scanning Lab
Understanding the basic tools needed to perform a vulnerability analysis allows a better understanding of the technical capabilities and limitations associated with scanning technologies.
View the "6-2 Vulnerability Scanning Lab" video, located in Class Resources.
Part I:
Complete the following:
A. Perform a vulnerability analysis against the Kioptrix 3 VM using the techniques and programs demonstrated in the video.
B. Provide screenshots and information related to vulnerabilities found on the Kioptrix 3 VM website and the Kioptrix 3 VM website page source.
C. Provide screenshots of the programs/commands you used to discover vulnerabilities on the Kioptrix 3 VM. Be sure to include, at minimum, the Nmap, dirb, nikto, searchsploit, and OWASP ZAP execution and output.
Part II:
Write a summary and address the following:
A. Evaluate the effectiveness of applications if they were directly related to a financial institution, government entity, or an ecommerce website in terms of cybersecurity for preventing crime and abuse.
B. Describe at least five vulnerabilities discovered during your analysis of the Kioptrix 3 VM. Get the instant assignment help.
C. Identify at least two different potential web extensions that could provide information to an attacker and describe why it is dangerous.
D. Explain a defensive strategy needed to offset the five vulnerabilities focused on above.