Module 5. Vulnerability Assessment
Vulnerability assessments scan networks for known security weaknesses: it recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channel; and evaluates the target systems for vulnerabilities such as missing patches, unnecessary services, weak authentication, and weak encryption. Additionally, it assists security professionals in securing the network by determining security loopholes or vulnerabilities in the current security mechanism before attackers can exploit them.
The information gleaned from a vulnerability assessment helps you to identify weaknesses that could be exploited and predict the effectiveness of additional security measures in protecting information resources from attack.
The labs in this module will give you real-time experience in collecting information regarding underlying vulnerabilities in the target system using various online sources and vulnerability assessment tools.
Objective
The objective of this lab is to extract information about the target system that includes, but not limited to:
Network vulnerabilities
IP and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports and services that are listening
Application and services configuration errors/vulnerabilities
The OS version running on computers or devices
Applications installed on computers
Accounts with weak passwords
Files and folders with weak permissions
Default services and applications that may have to be uninstalled
Mistakes in the security configuration of common applications
Computers exposed to known or publicly reported vulnerabilities
Last updated