Nt1310 Unit 3 Penetration Test

Decent Essays
Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses. In addition to conducting the test, the pen tester will provide management/owners with the results of the test.
Penetration test analyzes systems for weakness, vulnerabilities,
…show more content…
Verifies and validates current in place security controls and information programs from weaknesses

Penetration test types
There are various approaches to Pen testing
Black – in Black pen test, the tester typically has no knowledge of the organization’s infrastructure
Grey – in a grey pen test, the tester has some knowledge of the infrastructure
White – in the white pen test, the tester is typically in collaboration with the IT
…show more content…
Low tech, sometimes high reward tool
Port Scanning Tool. Port scanning tool will review and reveal any open ports
NMAP – is just one of many port scanning tools. NMAP capabilities:
Scans all ports, but can be selected scan only certain ports to reduce excess traffic
Determines what operating systems is being used on
Nessus – another popular scanner. Nessus has a large library of vulnerabilities and tests to identify
Like NMAP, Nessus can scan all ports and can detect what OS the system is using.
Nessus can run each portion separately for a more stealthy type of scan
Exploitation – After the recon, it’s time to exploit the vulnerabilities and weakness uncovered from the recon phase. This phase focuses on attempts at establishing access to systems or resources by bypassing whatever security restrictions that in place.

Biggest difference between a penetration test and an actual hacker attack really gets down to permission. A Pen Tester is mostly likely going to have a certain amount of permission to conduct his or her test whereas an attacker will not (unless he or she is an

Related Documents

  • Improved Essays

    Introductory Information Test name: Woodcock Johnson III Diagnostic Reading Battery Publisher: Richard Woodcock, Nancy Mather, and Frederick A. Schrank, 2004 Purpose of Test: The Woodcock Johnson III measures the skills and abilities required for reading. Construction Methodology The Woodcock Johnson III Diagnostic Reading Battery consists of ten subtests taken from the Woodcock-Johnson Test of Achievement III. The subtests include subtests administered in the standard fashion, with the examiner reading directions and prompts to the student; subtests that require audio presentations with headphones; and timed subtests (Overton, 2016).…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    1. Maintains an exact replica of one disk on another offering 100% fault tolerance. 2. Data redundancy - If one disk fails, data can be recovered from the other. 3.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 1039 Words
    • 5 Pages

    Amazon 5 Bullet Points: MONITOR LOVED ONES OR PATIENTS REMOTELY: Receive instant alerts when a loved one or patient exits the chair to enabling you to provide immediate assistance to reduce falls and prevent injuries. EASY SET UP: Easy to use sensor pad connection is wireless for convenience and portability for use in different settings. Alarm is easily reset by reapplying pressure to the sensor pad or turning off the alarm setting. COMFORTABLE WATERPROOF PAD:…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The third application software is mapping. Mapping application, are those that display street maps or satellite, and are usually used to locate places and directions. The most extensive mapping application is Google maps. When it comes to the location based software it uses your current location, and shows you the closest restaurants, shops, banks, etc. these software's are available for desktops, laptops, and handheld computers.…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 4 Test

    • 315 Words
    • 2 Pages

    Have you ever noticed that your PC keeps slowing down during the day? If ‘yes’, it might happen as because many programs simply remain in an execution mode and keeps sucking up a considerable amount of processing power. Such a type of fault remains specific to a fault specific to Windows 8.1 Task Manager Startup and the best way of tackling the same is with the help of taskmgr.exe fixing software. In this context, it could be said that the free online tools hardly prove to be of any benefit in fixing all analogous types & genres of issues. Adyne Roberts posted a series of queries one after the other.…

    • 315 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Test Paper

    • 695 Words
    • 3 Pages

    #Write a program that implements the Bubblesort algorithm #Registers used: # $a0 : For loading Syscall parameters like loading integer, string # address # $V0 : For intiating particular syscall and return values # $a1 : used as a argument to quicksort subroutine # $a2 : used as a argument to quicksort subroutine # $s1 : End address of iput array also as pointer # $s4,$t2 : Base Address of input array acts as pointer # $s3 : used to restore the address back to $s2 .text la $a0,String1 # enter address into a0 register to print String1 string li $v0,4 # printing msg syscall li $v0,5 #loading constant 5 into $v0 to read integer syscall move $a0,$v0 #scanned integer moving to $a0 sll $a0,$a0,2 #shifting bits left…

    • 695 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    To develop this application I have choose ASP.NET MVC 5.0 as a Front End and SQL SERVER 2012 Express edition as a Backend. To work on this technologies we are using Visual studio 2013 web Express and SQL SERVER Management Studio 2012. 1.1 SELECTION CRITERIA There are various reason for choosing this  Responsive design possible  SEO optimization is easy  Easy to implement …

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 1 Evaluation

    • 473 Words
    • 2 Pages

    When I started to film my advert, the location where I was filming was only open for 2 hours which didn’t give me a lot of time, so I made the decision to film everything inside the building because I could do all of the shots that were outside the following day, doing this gave me more time to spend on the shots inside. The one problem I ran into whilst shooting was that the camera wasn’t charged so I had to spend 20 minutes charging the camera, instead of doing nothing for that time I decided to go over with the actors what scenes we’d be doing and went through the shots we’d be doing. Next time before I film, I will check the camera to see if it has any charge. When it came to filming, everything went really smoothly, because of the practice…

    • 473 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3 Case Study

    • 283 Words
    • 2 Pages

    The kernel is not a fast food venor in this case but the system in which the operating system of the computer (such as Mac, Windows, Linux etc…) communicates with the cpu. What this bug has caused is a massive breach in the way this communication is happening because it has halted the communication from being coded allowing hackers to come in and destroy peoples systems. There should be a full investigation on Intel and any of the other affected chip makers and to prevent this from happening with any other chipsets in the future there needs to be government inspectors in this industry. I hope to learn why Intel/ARM chipset makers did not notice this bug and why they didn’t notify the public of this when they 1st discovered it. I also hope to…

    • 283 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Case Study

    • 333 Words
    • 2 Pages

    1. Message confidentiality means that a message being sent cannot be read by anyone other than the intended recipients, and message remains confidential and it cannot be read by unauthorized ones. Integrity defines the process of data is modified based on cryptographic procedures like hashing and message code techniques that ensures the message is not modified.…

    • 333 Words
    • 2 Pages
    Decent Essays