KALI VERSES XP In this lab report I will be discussing both the Kali Virtual Image as well as the XP Security Image. I will also emphasize on three particular tools of my liking related to each image and speak in detail of what those tools do and how they might help a security practitioner in a security operations center. Kali Linux: Kali Linux is a Linux distribution which is primarily for the security service such as like digital forensics and penetration testing. It comes on pre-loaded and
Comparison of Vulnerability Scanners Introduction With the advancements in information technology, the security concern of the users in the network is increasing drastically. Various approaches have been adopted to protect respective network from un-authorized users. New innovative methods have been presented in order to identify potential discrepancies that can damage the network. Most commonly used approach for this purpose is vulnerability assessment. Vulnerability can be defined as the potential
Footprinting The phases of an attack 1. Reconnaissance Information gathering, physical and social engineering, locate network range 2. Scanning - Enumerating Live hosts, access points, accounts and policies, vulnerability assessment 3. Gaining Access Breech systems, plant malicious code, backdoors 4. Maintaining Access Rootkits, unpatched systems 5. Clearing Tracks IDS evasion, log manipulation, decoy traffic Information Gathering 1. Unearth initial information What/ Who is
to it ("Facts about port," ). Also, accessive port scanning can lead to a denial of service (DoS) attack and not allow authorized users to access their data. Finally, there are again several utility tools available to perform port scanning such as Nmap as mentioned previously or SolarWinds Port scanner. Firewall To mitigate the security threat posed by ping sweeps and port scans it is highly recommended that firewall protection on all network hosts devices should be enabled to close any unused
Table of Contents 1. Introduction 2. Types of system security 2a. Internet and network security 2b. Standalone computer security 2c. Data loss by accidents 2d. Authentications 3. Types and techniques of computer system security 3a. System access control 3b. Data access control 3c. Spam filter 3d. Firewall software hardware and security 3e. Service mapping tools 4. Network security threats 5. Security tools hold the maximum potential 6. References Introduction A
Scenario:-New Security Tools and Techniques The discussion of the new security tools and techniques as covered in the prescribed text is not all inclusive. Research magazines, journals, and web sites to find three additional new security tools or techniques. Cover any new security threats that would be covered by these new security tools. Compare the tools with those listed in your text. Which one, in your opinion, holds the most potential? Discuss in your paper which one is the least likely to
Tenable Network Security, Inc.) Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in an IP network infrastructure using ZenMap GUI (Nmap) to perform an IP host, port, and services scan * Perform a vulnerability assessment scan on a targeted IP subnetwork using Nessus® * Compare the results of the ZenMap GUI “Intense Scan” with a Nessus® vulnerability assessment scan * Assess
The “Phase 2: Scanning” portion of the lab instructions were very confusing as they give commands to research and test but this portion of the lab has no interconnectivity to the internet. After much wasted time and talking to the lab assistances, it was noted that the students weren’t supposed to test in this environment but it was just information only and bringing up the help file. To offset and further understand this, the student set up a separate lab environment using Virtual Box with a Kali
5. OS Hardening Hardening the OS is an important step because it reduces the attack surface and opportunities for hackers to get into the system. The Linux Security Checklist from SANS has basic step by step guidance one can follow in securing an OS (Homsher & Evans, n.d.). 5.1. Never run Jenkins with root/administrator privileges One should never run with administrator or root privileges regardless of the operating system platform. If a hacker manages to get in, he or she will still need to find
Additionally, it is good to hide the machine ID and software versions. This is simply free information making it easier for the attacker. Wireless - Helmke (2015) also recommends using wired and avoiding wireless if possible. NMAP - Another vulnerability is open ports. Tools such as NMAP scan and determine if any ports are open. Unexpected open ports are clues that a potential breach has occurred and that a cracker has opened unauthorized ports. Intrusion Detection Systems – IDS should be installed that