preview

Essay on ISSC362 Week 2

Satisfactory Essays

ISSC362 Week 2 Lab #4:
Compromise and Exploit a Vulnerable Microsoft® Workstation
Instructor Name: ________________

Lab Assessment Questions

1. What are the five steps of a hacking attack?

2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.
3.
4. 2
3. What step in the hacking attack process uses Zenmap GUI?

4. What step in the hacking attack process identifies known vulnerabilities and exploits?

5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability …show more content…

List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?

6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?

7. What do If you were a member of a security penetration testing team, and you identifi ed vulnerabilities and exploits, should you obtain written permission from the owners prior to compromising and exploiting the known vulnerability?

8. What does the tool Ettercap do?

9. The most important step in the fi ve-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the Microsoft® Security Bulletin?

10. What is the name of the Microsoft® Windows 2003 XP server Security Patch needed to remediate this software vulnerability and exploit?
ISSC362 Week 2 Lab #4:
Compromise and Exploit a Vulnerable Microsoft® Workstation
Instructor Name: ________________

Lab Assessment Questions

1. What are the five steps of a hacking attack?

2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.
3.
4. 2
3. What step in the hacking attack process uses Zenmap GUI?

4. What step in the hacking attack process identifies known vulnerabilities and

Get Access