This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Penetration Test Proposal

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Penetration Test Proposal

Scanning Plan

Overview

Once I have collected information for the reconnaissance phase, there is a need to collect details necessary to penetrate the target. The list of destinations from the reconnaissance phase is too expansive and demand proper streamlining. Scanning will ensure that the systems are responsive and make sense. It is also a necessary action to eliminate any operation that might have turned unresponsive during the process of reconnaissance. In this phase, several methods are available for testing the availability of connected systems. However, I intend to use the technique of ICMP packets, which one of the most common practices in this application. I will use these methods to verify that all the selected systems are available before proceeding to the next phase. The technique chosen is familiar and straightforward. It is also very reliable in its application.

Tactics, Techniques, and Procedures

The ICMP echo is a technique that demands comments, for instance, so that all internet users will respond to them. Some systems, however, may have ways to blocks and ICMP, but most of them, and as identified in the reconnaissance, the Haverbrook Investment Group systems do not have such defenses in many of its applications. As a

result, it will be easier to use the tools to perform the scanning process. I intend to use these methods to achieve the said scanning to narrow down my process of hacking Haverbrook Investment.

Don't use plagiarised sources.Get your custom essay just from $11/page

In areas where the company has blocked ICMP, I intend to use the packets such as the TCP ACK. Te packet would return an RST whenever it is sent to a port that is firewall enabled, which will indicate whether the target system is active or not.  With this, I will manage to perform the tests to confirm those systems that are active and those that are not, to narrow down my process further. With the combination of these two packets., I will manage to perform a sweep based on the ping technique. A log file will allow the capture of these ping sweeps identifying active machines in the process. Moreover, the process will also enable the identification of dynamic IP addresses.

The ICMP Packets will be used to create and send messages to the IP addresses in the sources to indicate the gateway to the router of the internet or services that cannot be accessed through direct packet delivery.  I will send a series of ICMP request packets to the network of Haverbrook Investment groups. It will sweep their entire system with inferences of whether the hosts are connected and alive or they are out of operations. Once I have to Identify the status of the target areas, I apply the techniques for the subsequent steps.

Procedure

Perform SSH on a specific port to a particular host using the credentials obtained in the reconnaissance phase. The processes will log someone on to the virtual lab terminal server. Then issue a command based on Nmap to perform ICMP sweep on the target network. Here, the power based on Nmap will return an output to indicate active and inactive hosts. Login into the virtual lab and find the information that correlates to the IP addresses for the hosts, and hence, the target networks.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Achleitner, S., La Porta, T. F., McDaniel, P., Sugrim, S., Krishnamurthy, S. V., & Chadha, R. (2017). Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Transactions on Network and Service Management14(4), 1098-1112.

Dar, U. A., & Iqbal, A. (2018). The Silent Art of Reconnaissance: The Other Side of the Hill. International Journal of Computer Networks and Communications Security6(12), 250-263.

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask