Threat Protection & Testing Lab 3 – Running Tenable Nessus S

.docx

School

Full Sail University *

*We aren’t endorsed by this school

Course

CYB4381

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

1

Uploaded by JusticeMink2465

Report
Threat Protection & Testing Lab 3 – Running Tenable Nessus Scan Against Windows 7 VM Review the CVEs associated with EternalBlue and provide the following information for each CVE in the detected EternalBlue vulnerability findings. 1. Attack Vector : Network-based. Exploited through SMB protocol. 2. Attack Complexity : Low to Moderate. Exploiting this vulnerability doesn't require advanced skills but may depend on specific conditions. 3. Privileges Required : The attacker typically needs only unauthenticated access to the targeted system. 4. User Interaction : None. The vulnerability can be exploited without user interaction. 5. Scope : Remote exploitation, potentially affecting a wide range of systems. 6. Confidentiality : High. Successful exploitation can lead to unauthorized access and potential data exposure. 7. Integrity : High. The vulnerability can allow attackers to execute arbitrary code on the target system. 8. Availability : High. Exploitation can lead to a denial of service (DoS) or compromise the availability of the targeted system. Threat Protection & Testing Lab 4 – Exploit EternalBlue on Windows 7 VM and run Keylogger to capture keystrokes.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help