ISSC363 Assignment 4

# ISSC363 Assignment 4

A
0 points

Penetration Testing

Brian Page

American Military University

Introduction

Network Scanning is a crucial component of penetration testing that must be conducted in order for the penetration tester (PT) to determine the needs of the organization. Discovery of the devices that are on the network will allow the PT to see what devices are on the network and find out if there are any vulnerabilities in the software or hardware that can be exploited. For the purposes of this assignment, Kali or Backtrack Linux will be used as the penetration testing software, using nmap to discover devices and determine if they can be exploited.

Kali Linux: NMAP

The reasoning behind using nmap as the network scanner is it can also, in most cases determine what operating system the devices on...

ISSC363 Assignment
Ash

A
0 points

#### Oh Snap! This Answer is Locked

Thumbnail of first page

Excerpt from file: PENTESTING 1 PenetrationTesting BrianPage AmericanMilitaryUniversity PENTESTING 2 Introduction NetworkScanningisacrucialcomponentofpenetrationtestingthatmustbeconducted inorderforthepenetrationtester(PT)todeterminetheneedsoftheorganization.Discoveryof

Filename: issc363-assignment-4-85.docx

Filesize: < 2 MB

Print Length: 5 Pages/Slides

Words: NA

Surround your text in *italics* or **bold**, to write a math equation use, for example, $x^2+2x+1=0$ or $$\beta^2-1=0$$

Use LaTeX to type formulas and markdown to format text. See example.