[SOLVED] A structured walkthrough penetration test of a fictional company, Artemis, Incorporated | SolutionInn

5. Create two mock reports for the client:

An Executive Summary for the client’s senior management, and a Detailed Technical Report for the client’s IT staff. This project is an excellent addition to your portfolio as it demonstrates your understanding of critical security issues and your skills in identifying and analyzing threats and vulnerabilities. The project also allows you to speak knowledgeably about the entire process of performing a pen test, using your project as a reference point. Each phase will include its own deliverable(s). A full description of what is required can be found under each phase. Directions When planning penetration tests, consulting firms always sit down with the client’s key stakeholders to confirm scope and approach, identify the client’s concerns, and set expectations regarding the outcome. To this end, you have been provided with an overview of the client and an overview of the client’s IT environment. This information is critical because all risks must be evaluated within their context. The example below illustrates this concept: Technically Accurate– Artemis’ web application does not restrict or filter user uploads by file type. This is a vulnerability that could allow threat actors to connect remotely, execute arbitrary code, and then elevate their privileges within the application. With context– Artemis’ RFQ/RFP web application does not restrict or filter user uploads by file type. This is a vulnerability that could allow threat actors to connect remotely, execute arbitrary code, and then elevate their privileges within the application. In this instance, the threat actors would be able to view or download sensitive information regarding bids and even gain admin rights within the application. As you can see, the second description indicates the technical aspects and the business impact as well. The next two sections, client overview and technology overview, provide the context you will need to help you with the five phases of your capstone project. Client Overview ARTEMIS GAS, INC. (“Artemis”), based in Paris, France, is present in 40 countries with approximately 30,000 employees and serves more than 1.7 million customers and patients. Oxygen, nitrogen, and hydrogen have been at the core of its activities since its creation in 1922. They own and operate over 1,000 miles of industrial gas pipelines in the U.S., supplying mainly oxygen, nitrogen, hydrogen, and syngas in large quantities from multiple production sources to major customers in the chemicals, petrochemicals, refining, and steel industries. Their pipeline operations and industrial gas production facilities are closely monitored 24/7 within their leading-edge operations control center located in Houston, TX. Their operations control group monitors over 49,000 data points and assists with product supply and coordination. They are constantly optimizing their supply network to provide high reliability and energy efficiencies, allowing Artemis to adjust supply needs more quickly and effectively, thus enabling growth to their customers. Artemis has grown quickly over the past few years, and the need to “make things work” has outpaced the need to “make things work securely.” Some security solutions are fairly mature and effective; some are less so. Among the company’s concerns are: ● Some of the older network hardware that is being phased out is unsupported and may have unpatched vulnerabilities. ● Some of the newer network hardware may not have been configured properly. ● Some business units do not always follow company policy regarding storing data in the cloud, creating websites, or conducting file transfers. ● Some IT admins like to do their own thing because “that’s the way they’ve always done it.” This could be exposing the network to unknown risks. Technology Overview Artemis utilizes a mix of security vendors and technologies. The firewall landscape consists of Cisco, Fortinet, and Palo Alto. They use F5 (Big IP) for load balancing, and for secure remote application access, they use Zscaler. Roughly half of their servers and applications are in the cloud (Amazon Web Services), and the rest are on-premise (on-prem). These on-prem assets are spread out among four major data centers located in Houston, Paris, Cairo, and Singapore. The network is currently transitioning to SD-WAN, so there are still several MPLS links, especially at the smaller, more remote locations. The old Cisco equipment is being phased out in favor of Fortigate devices from Fortinet. Additionally, since the Fortigates can also act as firewalls, the company is considering eliminating the rest of its Cisco gear to cut costs. They are unable to supply a current network diagram. The ones they have are severely out of date and would not be of any use to you. Internally, Artemis utilizes a Single Sign-On (SSO) solution that leverages Microsoft Active Directory to authenticate users to other applications, namely SAP. SAP is the company’s primary ERP system and runs on servers running Linux and Oracle 12c. Messaging is a mix of Exchange Online (via the Office 365 cloud tenant) and on-prem Microsoft Exchange servers. The only other applications of note are the PARS system and the APOLLO system. PARS allows engineers to submit technical information regarding potential patents. If the submission passes legal and technical review, it is forwarded to the Intellectual Property group for submission to either the US Patent Office, the National Institute of Industrial Property INPI) in France, or both. APOLLO is the repository for trade secrets, primarily around manufacturing processes. Project Guidelines This next section will provide you with the goals, procedures, deliverables, and time estimates expected for each phase of the project. Read each of these sections carefully before proceeding to begin on phase 1. Phase 1. Perform Reconnaissance Goal: Build as robust a profile on the target (Artemis) as possible. The profile should include the target’s technology stack, email addresses, phone numbers, resumes, and so on. Procedure: Detail the activities you plan to use to obtain as much publicly available information as you can. Deliverable: Provide a minimum two-page description of all the tools and methods you will use to accomplish this task. Deliverable should cover at least 15 tools/resources. Phase 2. Identify Targets and Run Scans Goal: Identify the tools and techniques to be used to perform host discovery and enumeration. Procedure: List out the tools you plan on using to perform network scans, the purpose for using them, and how you will use them. For example:

2,707views
4.7
(416 ratings)

Related Study Guides

Chemistry Questions & Answers | Solutioninn.com

1. If the molar extinction coefficient () of a compound is 2.5 x 10 5 mol -1 lcm -1 at 528 nm and the Abs (at 528 nm) = 0.254 find the concentration of that solution. (assume a path length of 1.0 cm)....

chemistryinformation-systems

Chemistry Questions & Answers | Solutioninn.com

2. A pair of students forgets to precipitate the carbonate ions in their leaf compost jar's NaOH solution prior to the HCI titration. How would this affect the perceived amount of NaOH present in the....

chemistryhuman-resources

Course project | English homework help

Course project hiltorzoel4vBrainstorming and Searching for Sources Last week you chose a final project topic and began the research process. This week you will narrow your focus and find some prelimin...

art-designhuman-resources

NURS6501 Week 6 | Pathology in Health Care - Walden university

Question 13 A 17-year-old boy recently diagnosed with Type I diabetes is brought to the pediatrician’s office by his parents with a chief complaint of “having the flu”. His symptoms began 2 days ago,...

nursingart-design

Chemistry Questions & Answers | Solutioninn.com

1. Complete the diagram illustrating ionic bonds. Atom X gives I electron to each atom Y. Wha are the ions that form as result? Put the charges under each atom. 2. You add a negatively charged... Imag...

chemistryinformation-systems

Electrical engineering Questions & Answers | Solutioninn.com

1. Consider the single phase converter shown in Fig. P6-5 (textbook- Ned Mohan, page 155). The input voltage is 120 V, 60 Hz. The output DC current, I, is equal to 20A. For the firing angle of a-30,.....

art-designhuman-resources

[SOLVED] A structured walkthrough penetration test of a fictional company, Artemis, Incorporated | SolutionInn

1. Tool: Nmap. Purpose: Obtain information on hosts and the services and operating systems they are running. Commands: Deliverable: What are the tools you plan on using for the network scans, your rea...

human-resourcesinformation-systems

[SOLVED] Brexit and Rolls-Roycel Rolls said it remains committed to the UK | SolutionInn

Question: Brexit and Rolls-Roycel Rolls said it remains committed to the UK where we are headquartered, directly employ over 23,000 talented and committed workers and where Brexit and Rolls-Roycel Rol...

art-designcommunication

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student