What are the services related to the opened ports in windows

Assignment Help Computer Networking
Reference no: EM133761243

Networking and Information Security

Assessment Item: Introduction
assessment has been designed with the objective of using Kali Linux to expose vulnerabilities in a Windows PC. The vulnerabilities that Kali Linux will expose are the open services and port addresses that intruders can easily exploit to gain access to a Windows system, thereby posing a security threat.

You must use the Kali VM and Windows 10 VM configured in Session 5 with open ports to complete this assessment.

Use the nmap in Kali tool to analyze the vulnerabilities and the open ports from the Windows 10 VM, and make a report about the following:

A detailed Scan report of Kali and your view about the report.
What are the services related to the opened ports in Windows VM? You must give the usage of those services as well.
Vulnerability of every port/service mentioned in Step 2. Moreover, you must explain what the threats to an organization are due to those open ports.
How to mitigate those vulnerabilities.

The report should be 1000 words and should contain all the necessary screenshots taken from your VMs. Note that the screenshots should show the username of your PC as your student ID. (refer to labs 1 and 2)

Introduction
In this individual assignment, you are expected to install a commercial proxy server along with an online virus guard. The main objective of this assignment is to have students install a commercial proxy server to filter traffic based on its authenticity and intention. Specifically, students will install the Squid proxy server into the pfSense virtual host and configure it as both a proxy server for the LAN environment and an online virus guard.

To accomplish this, students should use pfSense, which was installed in session 5, to install Squid and the CLAM antivirus. The installation process, including configurations such as Windows proxy configurations, should be recorded via screen recording.

The activities the students should perform in this assessment.

Install pfSense and log into pfSense using either Kali Linux or Windows 10 VM.
Install Squid on pfSense.
Configure firewall rules in pfSense to enable the Squid proxy. The firewall should allow the local network for port address 3184.
Configure Squid, including local cache and remote cache, and enable the proxy to work.
Disable the NAT interface of the Windows PC and configure the local network of both Windows and pfSense. Set the IP address of the Windows VM as 192.168.1.100/24 and ensure the pfSense IP address is set to 192.168.1.1/24. Ping from the Windows VM to pfSense and ensure the connectivity between pfSense and Windows 10 VM.
Configure the Windows 10 virtual machine to use the proxy server as 192.168.1.1 and port 3184 and go to the Internet. You can do that by editing Windows 10 network settings to use a Proxy.
Enable and configure the "CALM" Antivirus guard in Squid.

Reference no: EM133761243

Questions Cloud

How your recruitment process will remain ethical : Explain how you will recruit participants for your study, and how your recruitment process will remain ethical. Be sure to address any incentives.
How do we deal with people who assume that since both the us : How do we deal with people who assume that since both the US and Britan speak English the cultures are not that dissimilar so not worth worrying about?
How does the time value of money impact you personally : How does the time value of money impact you personally and/or what impact does the time value of money have on your professional role?
Is sex appeal important than athleticism for female athletes : Is sex appeal more important than athleticism for female athletes, if they hope to have lucrative careers?
What are the services related to the opened ports in windows : ITNE2002 Networking and Information Security, Victorian Institute of Technology - expose are the open services and port addresses that intruders
Cooperation between organizations is often expected-fostered : Sharing knowledge about services often occurs. Collaboration and cooperation between organizations is often expected and fostered.
What do you believe the meaning is of erotic love imagery : How does this relate to what you believe? What do you believe the meaning is of the erotic love imagery? Do you find it shocking or not?
Identify a social inequality : Identify a social inequality that exists in your community to address in your proposal. Inequalities in economics and work, law and justice, or health.
What degree evolution impacts gender roles in 21st century : In one paragraph, comment on the changing roles of men and women in our society. Up to what degree evolution impacts gender roles in the 21st century?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd