Explore several scanning and enumeration tools

Assignment Help Software Engineering
Reference no: EM132281407

You need to make report based on the given 2 labs.

Client -Anthem

Lab 1: Passive Reconnaissance

Introduction
Passive reconnaissance is the act of gathering information about a target without actually using or interacting with the target. It's like spying on the target with binoculars or interviewing acquaintances or coworkers of the target, but not starting a conversation with the target just yet.

In a real-world situation, a hacker will conduct passive reconnaissance to gather information that can be used to formulate an attack against users and systems. Passive reconnaissance is typically followed by the scanning and enumeration phase, in which the hacker attempts to actively probe the systems identified during passive reconnaissance. Passive reconnaissance is also sometimes referred to as open-source intelligence gathering (OSINT), as it uses publicly available sources to collect intelligence on a target.

In this lab, you will form customized search queries using Google's search operators. With WHOIS queries, you will learn how to query Internet registration authorities about registered domains. In later parts of the lab, you will use two hacking tools, theHarvester and Maltego, to collect and organize information from indexed databases. Finally, you will bypass LinkedIn's privacy settings.

This lab has several parts, which should be completed in the order specified.

1. In the first part of the lab, you will use Google's search operators to identify information about targets.

2. In the second part of the lab, you will use Google's Advanced Search options to form customized search queries that can assist in locating vulnerabilities.

3. In the third part of the lab, you will learn to query Internet registration authorities for information available about registered domains.

4. In the fourth part of the lab, you will use the Kali Linux machine you created in the "Introduction to the Lab Environment" lab to collect information about a domain using theHarvester, a data-collection tool built into Kali.

5. In the fifth part of the lab, you will use the Kali Linux machine you created in the "Introduction to the Lab Environment" lab to gather information from multiple sources and graphically organize information using Maltego.

6. In the sixth part of the lab, you will explore a hidden vulnerability in LinkedIn's privacy settings.

7. Finally, you will explore the virtual environment on your own to answer a set of questions that allow you to use the skills you learned in the lab to conduct independent, unguided work, similar to what you will encounter in a real-world situation.

Learning Objectives

Upon completing this lab, you will be able to:

• Use customized Google searches to perform focused vulnerability searches.
• Use hacking tools to scrape information from public databases.
• Query Internet registration authorities for domain information.
• Use Maltego to identify publicly available e-mail addresses and domain names.
• Explore and circumvent privacy settings in a social network.

Lab 2:

Preparing to strike at a target involves careful investigation. The hacker first learns all he or she can from open sources before actually touching the target system. That process is called passive reconnaissance. Eventually, the hacker exhausts the available resources and has to actually probe the target system, thus initiating scanning and enumeration.

The final step before the actual exploit, scanning and enumeration involves learning about a target system from the system itself. The hacker sets about probing a target system to see what services might be open and running, what vulnerabilities might exist, and which weaknesses might be exploitable. Due to the nature of scanning and enumeration, the hacker runs the risk of his or her activities being discovered and stopped by the target. For this reason, the black-hat hacker will want to gather as much information as he or she can as quickly as possible. Because a white-hat, or ethical, hacker has a written directive from the target itself, he or she may be less concerned with timing.

In this lab, you will explore several scanning and enumeration tools, including some you may already know. You will use Nmap and its graphical user counterpart, Zenmap, to gather data about the network, and you will capture that traffic using Wireshark. You will use OpenVAS, a popular open source vulnerability scanner, to further explore a vulnerable system. You will create and run a customized scan and examine the results. Finally, you will start two penetration tools, Metasploit and Armitage, import the Nmap report, and further explore the system. This lab has four parts, which should be completed in the order specified:

1. In the first part of the lab, you will use Zenmap and Nmap, the original command-line version, to actively probe your local area network and export the scan results to a file.

2. In the second part of the lab, you will use the OpenVAS vulnerability scanner to run an in-depth vulnerability scan of the target machine and generate a report showing the identified and prioritized system weaknesses.

3. In the third part of the lab, you will use Metasploit, a common penetration testing tool, and Armitage, the graphical user interface (GUI) for Metasploit, to further explore the target system.

4. Finally, if assigned by your instructor, you will explore the virtual environment on your own to answer a set of challenge questions that allow you to use the skills you learned in the lab to conduct independent, unguided work, similar to what you will encounter in a real-world situation.

Learning Objectives
Upon completing this lab, you will be able to:
• Understand the benefits of and tactics for conducting scanning and enumeration.
• Perform network and system scans and export the results.
• Capture network traffic and investigate packet-level data.
• Understand how to start and configure Metasploit and its supporting services.
• Perform and customize vulnerability scans and interpret the results.

Verified Expert

This project is about vulnerability assessment project. On this project, we solved two lab activities. Different software tools and techniques are used for carrying out the lab activity. Different vulnerability assessment software is used for identifying the vulnerabilities. And they are reported in this project.

Reference no: EM132281407

Questions Cloud

The equal pay act : The Equal Pay Act of 1963. Under ADA, an employer is not required:
Discuss tough conditions that affected the victorian society : Use the works of two authors of the Victorian period to discuss at least four tough conditions that affected the Victorian society.
What is the value of optimal capital structure : What is the value of Optimal Capital Structure Inc. before restructuring?
Risk reviews to be conducted throughout project life cycle : De?ne a process to be followed for risk reviews to be conducted throughout the project life cycle. What is being done to communicate risks?
Explore several scanning and enumeration tools : CSCI 632 Ethical Hacking - Liberty University - explore the virtual environment on your own to answer a set of challenge questions
Test the claim that exercise program has no effect on weight : GEOG 362 Statistical Methods Lab Assignment, Concordia University, Canada. Test the claim that the exercise program has no effect on weight
Integrate qualitative-quantitative risk analysis techniques : Integrate qualitative and quantitative risk analysis techniques to identify methods for evaluating the probability of a risk event.
Discuss issue of womens rights at the turn-of-the-century : The work of literature must be a story/novel/play/poem that you have read on your own or that you plan to read during the research phase of this project;
Was the most e?ective method applied to determine risk : Were qualitative or quantitative methods used? Was the most e?ective method applied to determine risk?

Reviews

Write a Review

Software Engineering Questions & Answers

  Why you believe such diversity of approaches exists

Propose at least one additional reason why you believe such diversity of approaches exists. Provide support for your recommendation.

  Describe what actions you would take and in what sequence

Consider a situation in which your team has just finished the design phase and is about to start coding. Your key applications designer just walked in and handed you a resignation notice.

  Draw an e-r diagram for hospital staff

Draw an E-R diagram for the following situations. From discussions with hospital staff, reviewing hospital documents and studying existing information systems, the study team developed a list of business rules.

  Describe why the author of the article says that oil and

write a two to four 2-4 page paper in which you explain in your own words the information security concerns that exist

  Do a real-time structured analysis for the amac

ASSIGNMENT 1 FOR ITECH7410 - Your task is to do a Real-Time Structured Analysis for the AMAC.An External Entity-Relationship Diagram (ERD) indicating relationships of the AMAC and the other external entities in the system.

  Identify the most complex user-system interaction

Identify the most complex user-system interaction (input/response couplet) within the normal flow (ie the step with the most number of side effects, or most complex internal logic), and produce an operation contract for that input-response couplet..

  Design context diagram for entering user-s name in system

Design Context diagram, level0 and level1 (if need) for the following: The user submit her/his name to the system, the system will tell the user if he is a boy or a girl or don't know by looking up his name in database

  The firm has three major departments recruitment training

the firm has three major departments recruitment training and career services. the training centre provides management

  Paper for the software development community

Blending market research and user research activities interactions - What is the purpose of the article - What arguments are made to support the authors

  Write a function that takes one string made of numbers

write a function that takes one string made of numbers separated by comma. the function must return an integer of the maximum of the numbers.

  Identify difficulties faced in projects using rad techniques

Discuss the key advantages of applying RAD techniques to a software development project. Identify potential difficulties faced in projects using RAD techniques.

  Add the numbers 3 through 10 to the hashtable

We are working on hashtables and I am trying to figure out a real life example that could be solved with hashtables to jtree as well as some type of array or jlist. I just need some opinions or examples of this part please.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd