Daniel Nkansah C844 TASK 1

.docx

School

Western Governors University *

*We aren’t endorsed by this school

Course

C844

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

8

Uploaded by MegaFox4009 on coursehero.com

1 Nkansah Daniel Nkansah Emerging Technologies in Cybersecurity TASK 1 Professor Alan Bringardner November 18, 2023 A. As I ran Zenmap on the terminal, it launched the Zenmap console, I conducted a network scan of the domain 10.168.27.0/24. Opted for the quick scan plus option for the scan, the scan revealed the network was a followed a STAR topology. It revealed 6 devices, connected to the local host.
2 Nkansah B. First vulnerability I discovered was on host 192.168.27.15, it was running on Windows 8, which is outdated. Windows 8 is highly susceptible to security breaches as Microsoft support for windows 8 ended in January 2023. It no longer receives security patches and updates. The host remains vulnerable to zero-day attacks currently available for the last patch of windows 8 released. Secondly, 192.168.27.15 has port 21 (FTP) open for FTP traffic. FTP traffic is transmitted in cleartext, hence anyone listening on the port can read what is being transmitted without encryption. Making it vulnerable to man-in-the-middle and malware attacks. Malwares can be injected into applications that use FTP, malicious actors may intercept credentials by monitoring the cleartext, leading unauthorized access to other devices and account on the network.
3 Nkansah Finally, I discovered that on the same host, it has port 80 open, which is another unsecure port. HTTP is a port that encodes and transmits data between a web server and a client, making it the main protocol for information transmission over the internet. C. As I examined the Wireshark; I discovered that ICMPv6 traffic was being blocked, as I analyzed the traffic shown in Wireshark, turns out ICMPv6 traffic were being sent in rapid succession without waiting for response from the target machine. Secondly, seems a device with unknow identity was trying to anonymously gain access to the network. The use of the unsecured and unencrypted protocols such as FTP, potentially allow the network to be exploited by an intruder during a network scan. Finally, I discovered multiple stealth scans were conducted from 10.168.27.132, the intruder behind the attempt was trying to infiltrate various systems by scanning through a range of ports.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help