Reference no: EM132154501
Lab - Statement of Work
Client: Liberty Vacation Planning Inc. (LVP)
Project: Vulnerability Assessment
Project Objectives - With this statement of work, LVP is engaging you to conduct a network vulnerability assessment to determine if the production server (10.100.0.2) has any security vulnerabilities, and to ensure that it has been deployed into LVP's network following industry best practices. In addition, you will scan a similar server that is behind a firewall. The assessment should identify any critical vulnerabilities that could lead to system-level access to the server's operating system or any unsecured network share configurations. The objectives of this assessment are as follows:
- Launch a Nessus basic network scan against the host 10.100.0.2.
- Identify and confirm a high rated vulnerability from the Basic Network Scan pertaining to network file shares that was previously identified by the client.
- Identify and confirm a vulnerability that could lead to system-level access if the vulnerability were exploited by an attacker.
- Launch a Nessus Basic Network Scan against the host 10.100.0.3, which is behind a firewall.
Note: The objective of this Statement of Work is to identify (not exploit) the vulnerabilities..
Project scope - The scope of the vulnerability assessment project is as follows:
- The network server with IP address 10.100.0.2
- The network server with IP address 10.100.0.3
Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs.
Project deliverables - The deliverable(s) for this project are as follows:
a. Proof of a vulnerability scan
This proof will be provided in the following manner:
- A screenshot showing the critical and/or high findings from the Nessus Basic Network Scan
b. Proof of high rated file share vulnerability
This proof will be provided in the following manner:
- A screenshot of the contents of the text file hosted on the network share
- A brief paragraph describing, in your own words, the risk rating of the finding, as well as the finding is a vulnerability. You'll also need to defend your risk rating (e.g. critical, high, medium, or low)
c. Proof of vulnerability that could lead to system-level access
This proof will be provided in the following manner:
- A screenshot of the finding details from within Nessus (showing the description of the vulnerability along with its name)
- A brief summary of why you chose the finding you did, and the reason it was the most critical finding of the assessment
d. Proof of scan against a host behind a firewall
This proof will be provided in the following manner:
- A screenshot showing several findings from the Nessus Basic Network Scan
- A brief summary of the differences you noticed between the first Nessus scan with no firewall and the second scan, behind a firewall
4. Access to system
We have dedicated a Kali Linux machine on our internal network (Kali_Student_681) for use in your assessment testing. The machine includes access to the Vacation Destinations application and a copy of the applications code.
Project schedule - All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.
Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.
LAB VULNERABILITY ASSESSMENT INSTRUCTIONS -
1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.
2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.
3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.
Attachment:- Assignment File.rar