Lab 8.4.3 Performing A Vulnerability Analysis
Lab 8.4.3 Performing A Vulnerability Analysis
Objectives
• Download and install security analyzer software.
• Test a host to determine potential security vulnerabilities.
Background / Preparation
Security analyzers are valuable tools used by network administrators and auditors to identify network and
host vulnerabilities. There are many vulnerability analysis tools, also known as security scanners, available to
test host and network security. In this lab, you will download and install the Microsoft Baseline Security
Analyzer (MBSA). MBSA is designed to identify potential security issues related specifically to Microsoft
operating systems, updates, and applications. It also identifies unnecessary services that may be running, as
well as any open ports.
MBSA runs on Windows Server and Windows XP systems and scans for common security misconfigurations
and missing security updates for the operating system as well as most versions of Internet Information Server
(IIS), SQL Server, Internet Explorer (IE), and Office products. MBSA offers specific recommendations to
correct potential problems.
This lab can be done individually or in teams of two.
The following resources are required:
• Computer running Windows XP Professional to act as the test station.
• High-speed Internet connection for downloading MBSA (unless pre-installed).
• Computer must be attached to the integrated router switch or a standalone hub or switch.
• Optionally, you can have a server running a combination of DHCP, HTTP, FTP, and Telnet
(preconfigured).
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 8
CCNA Discovery
Networking for Home and Small Businesses
b. On the Additional System Information section of the screen (below), in the Issue column for
Services, click What was scanned, and click Result details under the Result column to get a
description of the check that was run. What did you find? When finished, close both popup windows
to return to the security report.
____________________________________________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 8
CCNA Discovery
Networking for Home and Small Businesses
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 8