This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Compromise and Exploit a Vulnerable Workstation

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Compromise and Exploit a Vulnerable Workstation

Challenges and Lessons Learned.

To complete this assignment, we were introduced to security tools used for footprint and attack specific systems. The purpose of ethical hacking is to strengthen a vulnerable workstation’s security by identifying holes in the system and providing possible solutions (Baloch, 2017). I used N-map for vulnerability scanning to identify susceptible ports, and TNS to establish a connection with the target system. I carried out a ping scan and a deep scan to identify possible attack points in the system.

Challenges

Hacking vulnerable ports are generally easy, provided you have the right tools. I did not face many challenges, and I was able to find solutions for the few difficulties that I encountered. The first challenge that hackers will face is in the numerous windows that they have to navigate through. Hacking is not a single action but a series of steps that have to be followed (Baloch, 2017). Navigating through the Zenmap graphical interface was straightforward. However, transferring the deliverable files (the intense scan and the ping scan) to my local system proved to be a little challenging. It took me a few tries to successfully do it.

Lessons learned

This exercise showed me how easily a hacker could gain control of your system without privileged access. It is fascinating how tools meant to protect networks and devices (like Nmap and TNS) can be used by hackers to harm your computer. It also showed me a step by step process of how to enter a vulnerable system. I can use this knowledge to protect my computers better. For example, I can use this scanning process to carry out a regular ping and full scans of my systems to identify and close any vulnerabilities. I can also advise my friends and families on how to protect their networks and devices better.

 

Reference

Baloch, R. (2017). Ethical hacking and penetration testing guide. CRC Press

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask