Lab 5
Lab 5
Overview
One of the most important first steps to risk management and implementing a security
strategy is to identify all resources and hosts within the IT infrastructure. Once you
identify the workstations and servers, you now must then find the threats and
vulnerabilities found on these workstations and servers. Servers that support mission
critical applications require security operations and management procedures to ensure C-
I-A throughout. Servers that house customer privacy data or intellectual property require
additional security controls to ensure the C-I-A of that data. This lab requires the
students to identify threats and vulnerabilities found within the Workstation, LAN, and
Systems/Applications Domains.
5. From the ZenMap GUI pdf report page 6, what ports and services are enabled on the
Cisco SecurityAppliance device?
443/tcp and ssl/http
6. What is the source IP address of the Cisco Security Appliance device (refer to
page 6 of the pdfreport)?
172.30.0.1
7. How many IP hosts were identified in the Nessus® vulnerability scan? List them.
7 IP hosts, include:
172.16.20.1
172.17.20.1
172.18.20.1
172.19.20.1
172.20.20.1
172.30.0.10
172.30.0.66
8. While Nessus provides suggestions for remediation steps, what else does Nessus
provide that can helpyou assess the risk impact of the identified software
vulnerability?
The number of effects that risks or vulnerabilities cause to system
10. When you identify a known software vulnerability, where can you go to assess the
risk impact of thesoftware vulnerability?
Common Vulnerability Scoring System (CVSS)
11. If Nessus provides a pointer in the vulnerability assessment scan report to look up
CVE-2009-3555when using the CVE search listing, specify what this CVE is,
what the potential exploits are, and assess the severity of the vulnerability.
CVE is a list of information security vulnerabilities and exposures that aims to
provide common names for publicly known problems
12. Explain how the CVE search listing can be a tool for security practitioners and a tool
for hackers.
It enables the users to identify system weaknesses. For hackers, this may be
extremely useful information. They could utilize this vulnerability to conduct an
attack if he knows about it. This will assist the administrator in identifying and
resolving problems, or at the very least mitigating them.
14. What would you define in a vulnerability management policy for an organization?
The possible risk involved with vulnerabilities that were found on systems and
how to plan to mitigate them.
15. Which tool should be used first if performing an ethical hacking penetration test and
why?
When executing an ethical hacking penetration test, Nmap should be used.
Because it's a robust port scanner and auditing tool. It is also an open-source
application that may run on a variety of operating systems, including Windows, Linux,
and Mac OS.