[SOLVED] A structured walkthrough penetration test of a fictional company, Artemis, Incorporated | SolutionInn

  1. Tool: Nmap. Purpose: Obtain information on hosts and the services and operating systems they are running.

Commands:

Deliverable: What are the tools you plan on using for the network scans, your reasoning for selecting them, and how they will be used. Be sure to include any challenges and potential drawbacks or limitations. Deliverable should cover at least 5 tools/resources. Course content reference: There are two optional labs, Reconnaissance from the WAN and Scanning the Network on the LAN, that may help you with this step. NOTE: Kali is not a tool; it is a Linux distribution or collection of tools, so do not include it in your list. Phase 3. Identify Vulnerabilities Goal: Identify the tools and techniques to be used to scan for vulnerabilities. Procedure: List out the tools you plan on using to perform vulnerability scanning and how you will use them. Include both Tenable Nessus and OpenVAS. Remember to include tools designed to look for vulnerabilities within specific technologies or platforms, such as Cisco devices, remote access services, and web applications (e.g., Burp Suite). Follow the same documentation procedure you performed in the previous step. Include screenshots of such tools showing configuration options and settings. Finally, list the pros and cons of each tool. Deliverable: Provide a minimum 2-page description of the tools you plan on using for the vulnerability scans, how you will use them, screenshots of the tools with configuration options and settings, and the pros and cons of each tool. Deliverable should cover at least 5 tools. Phase 4. Threat Assessment Goal: Create a hypothetical threat assessment based on vulnerabilities you expect to f ind when you perform your actual scans against the client’s network. Procedure: Assume the scenarios below are what you are most likely to encounter when you begin your actual work.

Scenario 1: Unpatched RDP is exposed to the internet

Scenario 2: Web application is vulnerable to SQL Injection

Scenario 3: Default password on Cisco admin portal

Scenario 4: Apache web server vulnerable to CVE-2019-0211

Scenario 5: Web server is exposing sensitive data

Scenario 6: Web application has broken access control

Scenario 7: Oracle WebLogic Server vulnerable to CVE-2020-14882

Scenario 8: Misconfigured cloud storage (AWS security group misconfiguration, lack of access restrictions)

Scenario 9: Microsoft Exchange Server vulnerable to CVE-2021-26855

Deliverable: Provide a spreadsheet or document showing the following items. Make sure you factor in the appropriate context. For example, if you think you might be able to penetrate the APOLLO system, evaluate those risks according to that system’s sensitivity and criticality. ● Description of the vulnerability ● Operating systems/versions affected ● Risks of attempting to exploit (e.g., might crash the host or lock out an account) ● Risk (what could you or a threat actor do upon successful exploitation)? ○ Identify as many attack vectors as you can. Examples: launch an attack on internal systems, obtain password hashes, crack passwords, access other systems, move laterally, and so on). ○ Identify potential blocking mechanisms such as AV software or IDS/IPS, and how you might try to bypass them. ○ Document how you plan on cracking passwords. This will depend on the source system’s course, but you should be ready for whatever you run into. Include online tools as well. ● Remediation action ● CVSS score Course content reference: You may need to refer back to the unit on risk assessment to analyse the vulnerabilities and assess what threat they pose to Artemis. In addition, review the two videos: Vulnerability Management: Assessing the Risks with CVSS v3.1 and Implementing the NIST Risk Management Framework in the Audit and Risk Management subunit. Remember: The threat depends on the likelihood and impact of the vulnerabilities being exploited and requires a review and knowledge of the current threats. Include all the information and risk ratings to determine the threat profile for Artemis. Phase 5: Reporting Goal: Create two mock reports for the client: An Executive Summary for the client’s senior management, and a Detailed Technical Report for the client’s IT staff and submit them to your boss (in this case, your mentor). Procedure: Create the two reports below: ● The Detailed Technical Report should contain the scope and approach, reconnaissance activities, vulnerabilities, and an analysis of the threats that Artemis faces based on the current threat environment. Use this resource as your guide and template for creating the Detailed Technical Report: The report should include the following sections: A. A cover page

B. A Table of Contents

C. Scope of Work

D. Project Objectives

E. Assumptions

F. Timeline

G. Summary of Findings

● The Executive Summary. The executive summary serves as a high-level view of the business risk in plain English. The purpose is to be concise and clear. Executives don’t need (or want) to understand the technology. It is imperative that business leaders grasp what’s at stake to make informed decisions for their companies, and the executive summary is essential to delivering that understanding. Visual communication can be tremendously helpful here. Try to use visuals like graphs and charts in communicating the summary data. The de facto approach is to use colors to denote risk severity, specifically, red, yellow and green. If there are four categories, then add orange. Step by Step Solution

3.48 Rating (158 Votes )

There are 3 Steps involved in it Get step-by-step solutions from verified subject matter experts

8,353views
4.8
(183 ratings)

Related Study Guides

Course project | English homework help

Course project hiltorzoel4vBrainstorming and Searching for Sources Last week you chose a final project topic and began the research process. This week you will narrow your focus and find some prelimin...

art-designhuman-resources

NURS6501 Week 6 | Pathology in Health Care - Walden university

Question 13 A 17-year-old boy recently diagnosed with Type I diabetes is brought to the pediatrician’s office by his parents with a chief complaint of “having the flu”. His symptoms began 2 days ago,...

nursingart-design

Electrical engineering Questions & Answers | Solutioninn.com

1. Consider the single phase converter shown in Fig. P6-5 (textbook- Ned Mohan, page 155). The input voltage is 120 V, 60 Hz. The output DC current, I, is equal to 20A. For the firing angle of a-30,.....

art-designhuman-resources

[SOLVED] A structured walkthrough penetration test of a fictional company, Artemis, Incorporated | SolutionInn

5. Create two mock reports for the client: An Executive Summary for the client’s senior management, and a Detailed Technical Report for the client’s IT staff. This project is an excellent addition to...

information-systemsart-design

[SOLVED] Brexit and Rolls-Roycel Rolls said it remains committed to the UK | SolutionInn

Question: Brexit and Rolls-Roycel Rolls said it remains committed to the UK where we are headquartered, directly employ over 23,000 talented and committed workers and where Brexit and Rolls-Roycel Rol...

art-designcommunication

[SOLVED] TST102 Fundamentals of Test Evaluation Lesson 17 - Assignment Assignment 1: | SolutionInn

Question: TST102 Fundamentals of Test Evaluation Lesson 17 - Assignment Assignment 1: Developmental Test Planning You are designing a developmental test to verify that the TST102 Fundamentals of Test...

art-designinformation-systems

Chemistry Questions & Answers | Solutioninn.com

1. If the molar extinction coefficient () of a compound is 2.5 x 10 5 mol -1 lcm -1 at 528 nm and the Abs (at 528 nm) = 0.254 find the concentration of that solution. (assume a path length of 1.0 cm)....

chemistryinformation-systems

Fin504 Week 1 | Finance in Business - Grand canyon university

3. Risk Refinements in Capital Budgeting: P12-2; P12-4 Use the Chapters 10-12 Excel resource (if needed) to complete the problem-set assignment in this topic. Please show all work for each problem. Yo...

financehuman-resources

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student