IS499 finale project

I need an explanation for this Computer Science question to help me study.

Struggling to find relevant content or pressed for time? – Don’t worry, we have a team of professionals to help you on
IS499 finale project
Get a 15% Discount on this Paper
Order Now

IS499 – Final Project

This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned in labs to a set of unknown systems. They will synthesize the output of security tools and the results of research into a report evaluating the security of each unknown system.

This document is divided into the following sections:

  • Scope of the Assessment (which resources are to be assessed)
  • Rules of Engagement (specification of what actions are permitted during the assessment)
  • Resources Required (security tools)
  • References (information sources)
  • Procedure
  • Report Format
  • Submission Details

1Scope of Assessment

The assessment is limited to the following IP addresses.

  • 172.30.0.15
  • 172.30.0.17
  • 172.30.0.11
  • 172.30.0.12

2Rules of Engagement

Students may use any security tools to perform a security evaluation of the systems listed in the Scope of Assessment. These tools should include but are not limited to those listed in the Resources Required. Security tools can be used to identify potential vulnerabilities and verify these potential vulnerabilities through the use of exploits.

However, no tools that are designed to crash a system or otherwise create a denial of service attack may be used.

Students may not port scan, vulnerability scan, or attempt to exploit any IP addresses outside those listed in the Scope of Assessment. In general, no security tool may be deployed against any IP addresses outside of the ones listed. Of course, students may contact other servers to search the web and perform research, such as by using the references below.

3Resources Required

Students will use the tools to test the environment from Lab 2 – Performing Reconnaissance and Probing using Common Tools or Performing a Vulnerability Assessment.

4References

Students may use the following references useful in performing the assessment and writing the assessment report.

  • Kali Linux Documentation,
  • CVE Details, provides information about reported vulnerabilities and can be searched by vendor, service, and vulnerability.
  • Metasploit, provides information on how to use Metasploit to exploit systems.
  • Nmap Documentation, will help to scan options and show how to best understand nmap output.
  • Wireshark,

http://www.kali.org/official-documentation/

http://www.cvedetails.com/

http://www.offensive-security.com/metasploit-unleashed/

http://nmap.org/docs.html

http://www.wireshark.org/

5Procedure

5.1Network Scanning and Enumeration

Scan each IP address listed in the Scope with nmap. Scans should verify that the systems are up before proceeding, then identify the operating systems of each system, and finally identify both the names and versions of the running services on each system. Students will need to scan all TCP and UDP ports as well as obtain all of the detailed data that nmap can can offer by using the –A option.

5.2Vulnerability Research

First, lookup the operating system type and version that were reported by network scanning tools on CVE details. Next, lookup any services, such as IIS or Apache, whose names were identified in the previous step. Use service versions to determine which vulnerabilities apply to the system under assessment. Compare these lists of vulnerabilities with the ones found in the next step: vulnerability scanning.

5.3Vulnerability Scanning

OpenVAS setup process, but no other setup should be necessary. Create scan congurations for each of the targets. Be sure that you can ping a target before beginning an OpenVAS scan. If an OpenVAS scan reports zero vulnerabilities,

5.4Vulnerability Validation

With the exception of denial of service vulnerabilities, all reported vulnerabilities with a severity of high or medium must be validated.

Severity levels are the level reported by OpenVAS or the CVSS score shown on CVE details.

Students should first search OpenVAS to find exploits for validation. Search terms should include vulnerability identifiers like CVE numbers, service names like Apache or IIS, service versions, and text from the OpenVAS or CVE Details vulnerability description. If an exploit is successful against a system, then the reported vulnerability has been validated.

If an exploit cannot be found in OpenVAS, research the vulnerability in vulnerability databases, such as CVE Details. Use the vulnerability database to verify that the reported vulnerability affects the platform, service, and versions that the assessed system is running. If the vulnerability does affect the system according to the database, then the reported vulnerability has been validated.

6Resolving Problems

While students are not permitted to use tools that are designed to crash systems, it is possible for exploitation of vulnerabilities to crash target VMs.

If a target VM is not responding for more than 15 minutes, notify the instructor about the problem.

7Report

The report will need to be at least 5 pages single spaced using a 12-point font. The report must be divided into six sections: the summary, procedure, one section for each assessed system, conclusion, and references. Sections must be identified by a heading in boldface in the same manner that sections in this document are formatted. References should include the references mentioned in this document that were used, along with any additional references found via the Sites page on the class web site or through other sources.

The report must begin with a summary of findings of the security assessment.

For each system, describe its operating systems and services, speculate on what purposes it may serve in an organization, and describe how vulnerable it is to attack. The level of vulnerability depends not only on the number of vulnerabilities found, but also on the number of validated vulnerabilities and on the severity of each the vulnerabilities found. The summary must include a table of the following form, summarizing the findings at a high level:

IP Address

MAC Address

Operating System

Number of Vulnerabilities

The procedure section of the report describes the precise procedure followed based on the Procedure above. Do not include setup of OpenVAS, but do include the setup of any additional tools used.

Describe the order of steps and include the full command lines used with all arguments, except for OpenVAS. Details of OpenVAS commands will be included in the following sections.

Each of the following sections will describe one of the systems assessed. These sections must have names of the form Assessment of IPADDRESS, where IPADDRESS is replaced by the IP address of the system whose assessment is described in that section. Each section should include an overall assessment of the security of the system, which will expand on the summary above.

Following the summary, include a graph from CVE details showing vulnerabilities in the operating system type and version. Then create a table of the open ports, describing the services running on them, including their versions and vulnerabilities (if any). This table should summarize the results found via port scanning, vulnerability scanning, and vulnerability validation.

Port Number

Service

Version

Reported Vulnerabilities

Validated

Vulnerabilities

21/tcp

ftp

vsftp 1.3.2

CVE-2006 1418,

BID-1215

CVE-2006-1418

22/tcp

ssh

openSSH 3.9

CVE-2005-2798,

CVE-2006-5051,

BID-1397

None

Organize each section by service name, or port number if you were unable to identify the service running on the port. Under the service list the vulnerability details, including an identifier for the vulnerability, a one-line description, a detailed description, the results of validation, and how it was validated, in the format shown below. The best vulnerability identifier is a CVE number, but not all vulnerabilities will have those, and so another type of identifier, such as a BID or NVT number should be used.

For vulnerabilities with no exploits in OpenVAS, the validation section would indicate whether validation was successful or not, along with links to specific vulnerability reports and/or exploits that show that this particular service at the specified version was or was not vulnerable.

For example:

Verified that vulnerability a affects this service and version at http://www.osvdb.org/83771 and http://www.exploit-db.com/exploits/19525.

The second to last section should summarize the findings of the assessment, repeating the information from the first section, and provide a short description of how to mitigate the discovered vulnerabilities through patching, upgrades, service changes (i.e., use ssh instead of telnet), or deployment of security devices like firewalls. Be specific about mitigations: include the version or service pack name to upgrade to, which vulnerabilities it would fix, specify which ports to block on a firewall to fix specified vulnerabilities, etc.

The final section should list references used.

8Submission

The report must be turned in as a Word document in the formatted template provided.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with MyCoursebay
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Nursing
Excellent as usual. Thank you!
Customer 452707, June 24th, 2023
Psychology
Excellent!!!!
Customer 452587, July 28th, 2021
Other
GOOD
Customer 452813, July 5th, 2022
Nursing
Words can't describe how helpful this service has been for me. Thank you!
Customer 452707, January 9th, 2023
Human Resources Management (HRM)
The paper was good but they writing the paper labeling me as a Registered Nurse and I have express this several time so o had to go in make corrections
Customer 452901, April 8th, 2024
Medicine
Great job! Thank you.
Customer 452707, May 29th, 2022
Political science
THANK YOU
Customer 453001, April 25th, 2024
Nursing
Thank you for a great paper.
Customer 452707, August 6th, 2022
ENVIRONMENT SCIENCE
GOOD
Customer 452813, June 19th, 2022
Nursing
Top notch quality!
Customer 452453, February 16th, 2023
Human Resources Management (HRM)
Well written paper. Thank you so much.
Customer 452701, September 25th, 2023
Nursing
I appreciate all the hard work. Thank you!
Customer 452525, August 13th, 2021
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information