Daniel Nkansah C844 TASK 1
.docx
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
C844
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
8
Uploaded by MegaFox4009
1
Nkansah
Daniel Nkansah
Emerging Technologies in Cybersecurity TASK 1
Professor Alan Bringardner
November 18, 2023
A.
As I ran Zenmap on the terminal, it launched the Zenmap console, I conducted a network
scan of the domain 10.168.27.0/24. Opted for the quick scan plus option for the scan, the scan revealed the network was a followed a STAR topology. It revealed 6 devices, connected to the local host.
2
Nkansah
B.
First vulnerability I discovered was on host 192.168.27.15, it was running on Windows 8,
which is outdated. Windows 8 is highly susceptible to security breaches as Microsoft support for windows 8 ended in January 2023. It no longer receives security patches and updates. The host remains vulnerable to zero-day attacks currently available for the last patch of windows 8 released.
Secondly, 192.168.27.15 has port 21 (FTP) open for FTP traffic. FTP traffic is transmitted
in cleartext, hence anyone listening on the port can read what is being transmitted without
encryption. Making it vulnerable to man-in-the-middle and malware attacks. Malwares can be injected into applications that use FTP, malicious actors may intercept credentials by monitoring the cleartext, leading unauthorized access to other devices and account on the network.
3
Nkansah
Finally, I discovered that on the same host, it has port 80 open, which is another unsecure port. HTTP is a port that encodes and transmits data between a web server and a client, making it the main protocol for information transmission over the internet.
C.
As I examined the Wireshark;
I discovered that ICMPv6 traffic was being blocked, as I analyzed the traffic shown in Wireshark, turns out ICMPv6 traffic were being sent in rapid succession without waiting for response from the target machine.
Secondly, seems a device with unknow identity was trying to anonymously gain access to
the network. The use of the unsecured and unencrypted protocols such as FTP, potentially
allow the network to be exploited by an intruder during a network scan.
Finally, I discovered multiple stealth scans were conducted from 10.168.27.132, the intruder behind the attempt was trying to infiltrate various systems by scanning through a
range of ports.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help