Premium Essay

Lab 1 Securing Systems

In:

Submitted By cocokes
Words 291
Pages 2
Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN)

1. What is the first Nmap command you ran in this lab? Explain the switches used.
The first nmap command used was nmap -O -v 10.20.100.50. -O was to detect the operating system of the 10.20.100.50 machine, while -v showed much detail.

2. What are the open ports when scanning 192.168.3.25 and their service names?
There are twelve open ports. 80 is HTTP services, 135 is the Microsoft EPMAP aka DCE/RPC locator service, 139 is the NetBios session service, 445 is the Microsoft-DS, SMB file sharing, and the common internet file sharing, 3389 is the RDP, 5357 is the web services for devices, and 49152 to 49157 is the DCOM or ephemeral ports.

3. What is the command line syntax for running an SMB vulnerability scan with Nmap against 10.20.100.50? nmap --script=smb-check-vulns -p445 10.20.100.50

4. Explain why SMBv2 DoS (CVE-2009-3103) is bad.
It allows a denial of service attack with the blue screen of death. It makes the system a high risk system.

5. What is the operating system of IP address 192.168.40.238?
The operating system is FreeBSD 7.X|8.X|9.X|10.X The only open port is port 22 which indicates it is the SSH.

6. What are the reverse IP addresses for the three remote computers scanned in this lab?
10.20.100.50 is 50.100.20.10-apples.colo9.sg.com. 192.168.3.25 is 25.3.168.192-WASHDC103.mainstreet.coresite.com. 192.168.40.238 is

Similar Documents

Premium Essay

Ethical Hacking Lab 1

...Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) IT-387 Ethical Hacking Course Name and Number: _____________________________________________________ Emmanuel Garcia Student Name: ________________________________________________________________ Jacob Boaheng Instructor Name: ______________________________________________________________ 09/29/2014 Lab Due Date: ________________________________________________________________ Overview In this lab, a systems administrator for the securelabsondemand.com network has reported odd behavior on two servers that support legacy applications you first conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first Nmap command I ran on the the lab was nmap -O -v 10.20.100.50. To explain the switches used winch are re presented with (-O) and (-v). (-O) means detect the operating system of the 10.20.100.50 machine and view or show the detail of the open ports. 2. What are the open ports when scanning 192.168.3.25 and their service names? After I have run the Nmap command for the 192.168.3.25 It show the port the were open such as port 80 HTTP hypertext transfer protocol, port 135 MSRPC Micro Soft Remote procedure Call, port 139 NetBios-ssn is...

Words: 373 - Pages: 2

Premium Essay

Windows Servers

...Topics |Securing Windows 7 |Installing Windows Server 2008 | |Password and Account Lockout Policies |What Defines a Server | |Windows Firewall Configuration |Server Hardware | |Encrypting File System (EFS) |Windows Server 2008 Editions | |Remote Access Technologies |Server Roles in Windows Server 2008 | |Backup and Restore |Method of Installing Windows Server 2008 | |System Restore Points |Server Configuration | | |IP Address Settings | | |Management of Devices and Device Drivers | | |Microsoft Management Console (MMC) ...

Words: 2079 - Pages: 9

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...

Words: 3209 - Pages: 13

Premium Essay

Unit 1 Assessment Worksheet

...IS3445T Security for web applications | Evaluate Business World Transformation- Impact of the Internet and WWW | Unit 1 Lab 1 | | Daniel Alvarado Jr. | 6/24/2014 | | LAB ASSESMENT QUESTIONS & ANSWERS 1. From the results of the Lab #1 – Business Application Impact Analysis Worksheet, what do you consider to be the greatest type of risk and why? * Private own Bank/ due to financial information 2. Why is it critical to perform periodic web application vulnerability assessments and penetration test? * To reduce vulnerabilities and test environments/ in addition to securing operating systems 3. What kind of web application does Damn Vulnerable Web Application use? * PHP/open source APP * Web Based * Penetration Testing 4. Why is connecting your web servers and web application to the internet like opening Pandora’s Box? * Opens your system to vulnerability confidential information 5. What does the skipfish application do and why is it good security tool for web servers and web application testing? * High speed Web App Recon Tool 6. What is tcdump and why is it a good tool for application for testing the Ubuntu Linux web server and web application security? * Allows to see traffic protocol testing 7. What does the Firefox Live HTTP Headers Plug-in application do, and why is this a good tool for web server and web application security testing? * Debug Application * See Server response 8...

Words: 294 - Pages: 2

Premium Essay

It255

...Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 ...

Words: 4114 - Pages: 17

Premium Essay

Essay

...Lab #3 – Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: NT2520 Introduction to Information Security_V2.0 Student Name: Rony Azanon Instructor Name: Brandon Solomon Lab Due Date: august 9, 2015 Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned unique file permissions using the new user accounts and security groups. You modified the Windows Group Policy enabling each new user account to use remote desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? Identification, Authentication and Authorization 2. Of these three fundamental controls, which two are used by the Domain User Admin to create users and assign rights to resources? Security policy is set to read only 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured...

Words: 482 - Pages: 2

Premium Essay

Is4550 Week 5 Lab

...------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * Identify gaps in the IT security policy framework definition * Recommend other IT security policies that can help mitigate all known risks, threats, and vulnerabilities throughout the 7 domains of a typical IT infrastructure Week 5 Lab Part 1: Assessment Worksheet (PART A) Sample IT Security Policy Framework Definition Overview Given the following IT security policy framework definition, specify which policy probably can cover the identified risk, threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. Risk – Threat – Vulnerability | IT Security Policy Definition | Unauthorized access from pubic Internet | Acceptable use policy | User destroys data in application and deletes all files | Backup Recovery Policy | Hacker penetrates your IT infrastructure and gains access...

Words: 1625 - Pages: 7

Premium Essay

Assessing and Securing Systems on a Wan and Applying Encryption and Hashing Algorithms for Secure Communications

...Unit 1 Individual Project Danielle Hunker Ethical Hacking Colorado Technical University Online CSS280 February 22, 2016 Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) Course Name and Number: Ethical Hacking CSS280 Student Name: Danielle Hunker Instructor Name: Jimmy Irwin Lab Due Date: February 22, 2016 Overview In this lab, a systems administrator for the securelabsondemand.com network has reported odd behavior on two servers that support legacy applications you first conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1. What is the first Nmap command you ran in this lab? Explain the switches used. Nmap command: nmap –O –v 10.20.100.50 -O was the switch used to detect the operating system 10.20.100.50 -v was the switch used to show the detail of 10.20.100.50 2. What are the open ports when scanning 192.168.3.25 and their service names? * 80 HTTP services * 135 Microsoft EPMAP (End Point Mapper) * 139 NetBios session service * 445 Microsoft DS, SMB file sharing and CIFS (common internet file sharing) * 3389 RDP (Remote Desktop Protocol) * 5357 WSDAPI web services for devices * 49152 uo to 49157 DCOM or ephemeral ports 3. What is the command line syntax for running an SMB vulnerability scan...

Words: 832 - Pages: 4

Premium Essay

Seeking Help

...to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security...

Words: 4296 - Pages: 18

Premium Essay

Chemical Inventory Management

...Chemical Inventory Management System David Acker Auburn University Risk management and Safety Abstract Managing chemical inventories at colleges and universities is one of today’s major challenges for higher education. This is especially true for large, diverse, research-oriented institutions like Auburn University. Knowing what chemicals are on site, their hazard potential, who is responsible for them, and where they are located is essential to maintaining a safe campus. Additionally, Federal and State regulations dealing with hazardous waste, chemical security, and emergency preparedness have become more stringent in recent years, requiring greater accountability from colleges and universities. These safety and regulatory compliance imperatives, along with issues of environmental sustainability and cost containment, drive the need for effective chemical inventory management in the university environment. In order to achieve effective chemical inventory management at Auburn University, Risk Management and Safety (RMS) has implemented a Chemical Inventory Management System (CIMS). The technological core of the CIMS is a chemical tracking database that provides realtime, discreet (to the individual container) monitoring of chemical inventories. The database has the capacity to accurately link the chemical container to hazard data, location, user, and acquisition date. Personnel, equipment, and budgetary resources were required to support the implementation phase, and ongoing...

Words: 4990 - Pages: 20

Premium Essay

Sharepoint Upgrade

...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...

Words: 74170 - Pages: 297

Free Essay

Aawoakdl Nwkej Pokawdkj Bkjaw

...EE13204 Operating Systems      Lab 5   INSTITUT TEKNOLOGI BRUNEI   Electrical and Communication Engineering   EE13204 Operating Systems      Lab 5: Providing Network Access to File Resources      Objective:   At the end of the lesson, the students should be able to:   •    Share and secure network resources   Part 1: Sharing and Securing Network Resources      1) Sharing Folders   In this exercise, you will create a shared folder ECE_Data on the server.      a. Log on to server as domain administrator.   b. Create a ECE_Data folder in your root directory (C:).   c. Open the Properties dialog box for the ECE_Data folder, and then click the Sharing tab. d. Click  Share this folder.   The share name defaults to the name of the folder.   e. In the Comment box, type Share Data and then click OK.      How does Windows Explorer change the appearance of the ECE_Data folder to indicate that it is a  shared folder?                        NE/Semester 2 (2011)     There is a hand holding a folder icon, indicating that the folder is shared    1   EE13204 Operating Systems      Lab 5   2) Assigning Shared Folder Permissions   In this exercise, you will modify the default share permissions on the ECE_Data folder and configure READ and  FULL CONTROL permissions to ECE Program Review staff and ECE Lecturers. ECE Program Review staff will  have Full Control permissions and ECE Lecturers will have read access. Then, you will test the permissions to  that folder...

Words: 830 - Pages: 4

Free Essay

Forensic Evidence

...science has become increasingly necessary to help with criminal and civil investigations. Although forensic evidence is admissible in court one must keep in mind how that evidence made its way to the court system. I will take you through the process. For there to be admissible evidence for a court case there must be physical evidence which would have been collected at a crime scene therefore there must have been some kind of crime committed. A crime with physical evidence doesn’t necessarily mean something violent but it can be. Theft, arson, car accident and murder are just a few examples of what a crime can be. The process begins when the crime has been committed, to the officers arriving on the scene, to surveying the scene, collecting the evidence, submitting it to the lab, submitting it as evidence and finally the acceptance of the evidence. When a call is sent out regarding a possible crime and the first officer arrives on scene it is that officer’s obligation to do a few things as precise as possible: 1. seek medical attention for those who may need it, 2. arrest or detain any perpetrators, and 3. secure the crime scene. Securing the crime scene is extremely important because you want to be able to retrieve as much evidence as possible. By securing the crime scene you are blocking off the area from unauthorized personnel. You want to keep the foot traffic to a minimum to prevent tampering and contamination to the scene. Determining how large a crime scene...

Words: 1263 - Pages: 6

Premium Essay

Advance Medical Tech. Corp. Case Study

...I.INTRODUCTION Experiencing low cost traditional surgical procedures, Advanced Medical Technology Corporation (AMT) wants to broadcast this tagline by manufacturing well designed medical instrument based on a massive researching. Taking into account the efforts and allowances spilled by AMT on its research and development aspect, and in invading new markets, it is not unexpected that it had gained an extraordinary growth and rapid expansion of its sales force for just a few years of being established. Like any other companies who were in their infancy/growth stage, it is a normal thing to put the best shoe forward in order to gain an A+ mark. But the aggressiveness nature of the decisions made by Peter Haskins, president of the AMT, had, to the conclusion of some lenders, contributed to several tribulations that impede the continuous growth of the company. Though AMT had gained extraordinary growth through their well done researches, it tends to risk its financial aspect by exhausting too much fund just to develop and produce its product. Its mismanagement of its assets had made potential creditors to deny its loan requests. These facts had led to the perfection of this study. It aimed to analyze the problems faced by the company, the cause of these problems and how the company will trounce these problems. II. EXECUTIVE SUMMARY Advance Medical Technology Corporation (AMT) developed, manufactured and sold scientific medical instruments, needles, and catheters that allowed...

Words: 2630 - Pages: 11

Free Essay

Securing Internet Client and Server Applications on Windows Systems

...Securing Internet Client and Server Applications on Windows Systems Assessment Worksheet Note: This tab is for reference only. Please see your instructor to determine the assessment they wish you to use. Overview Both IIS and Internet Explorer can be hardened to improve confidentiality, integrity, and availability (CIA). In this lab, you identified security hardening opportunities for the IIS application, then made those changes on a Windows Server 2012 machine. Next, you will identified and modified the Internet Options for the Internet Explorer browser. Finally, you documented the changes you made and provided an explanation for how each change helps achieve CIA. Lab Assessment Questions & Answers 1. What are the steps you took to harden IIS? Disabled services not used by functional roles and blocked ports that were not in use. These steps are necessary because servers proved one or more specific services on the network. 2. What are the steps you took to harden the Internet Explorer browser? Opened only minimum required ports at the firewall; use encrypted connections for all communications; disabled any unneeded server features on the Web server. These are important because they heighten security. 3. As a result of this lab, which changes will you implement on your own Internet browser? Why? Disable any features that are not being used. Also turn on pop-up blocker. 4. Why should you change the directory where the log is stored? You should change...

Words: 398 - Pages: 2