P4: Plan Procedures to Secure a Network
P5: Configure a networked device or specialist software to improve the security of a network.
Test Kali NMAP and show OS vulnerabilities
Test Wireless capture of packets
Test kali payload to gain access to the remote system using Metasploit framework
Enable firewall and port blocking
Enable Virus protection
Backup and restore systems
Item Time/date Configuration/ setup details
I will be testing KALI NMAP and show OS
vulnerabilities by going over the network discovery
portion of Metasploit and from there I am going to
enumerate the machine to see which ports and
services are listening. I am going to ping the IP range
for testing so the first thing I have done is find the
actual machine on the network. I am going to be using
the net discover tool in Kali for so the machines
configured for hosts only inside a virtual box that the
IP range is 192.168.56. 102 as you can see in the
screenshot I have taken. I have verified the IP address
of my Kali machine by opening a terminal window.
Jessreen Sandhu
, For the actual enumeration, I have run Nmap version
scan by clicking nmap -sV -p-65535 192.168.56.101.
As you can see it has found several open ports and the
system administrators who will configure services on
different ports to throw somebody off by thinking that
security obscurity is particular service that has been
moved to another port so it won’t be able to find it
and attack it. The scans ports service will show up on
here even if it's not on the default port as you can see
that there is few open ports on this machine in
addition to the port's that Nmap discovered we also
see that it gave us the services that I am running on
each port and the versions for each particular port.
Telnet is a program that allows you to establish a
connection between two computers with the security
issue comes in that telnet transmits your data in clear-
text so if somebody happens to be running a sniffer on
your network they could intercept your traffic and
possibly catch you logging into a machine and then
that would give the attacker your username and
password. Telnet show how an attacker could
intercept your traffic and get there for gaining
valuable information based on the perspective where
the attacker has gained access to your computer and
id they have installed a network sniffer on your
machine. I have entered “telnet 192.168.56.101 21”
on my machine and I have used the msf admin
account to login to look at the one of these telnet
packets.
Jessreen Sandhu
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jessykaur. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £4.99. You're not tied to anything after your purchase.