Compromise and Exploit a Vulnerable Workstation
Challenges and Lessons Learned.
To complete this assignment, we were introduced to security tools used for footprint and attack specific systems. The purpose of ethical hacking is to strengthen a vulnerable workstation’s security by identifying holes in the system and providing possible solutions (Baloch, 2017). I used N-map for vulnerability scanning to identify susceptible ports, and TNS to establish a connection with the target system. I carried out a ping scan and a deep scan to identify possible attack points in the system.
Challenges
Hacking vulnerable ports are generally easy, provided you have the right tools. I did not face many challenges, and I was able to find solutions for the few difficulties that I encountered. The first challenge that hackers will face is in the numerous windows that they have to navigate through. Hacking is not a single action but a series of steps that have to be followed (Baloch, 2017). Navigating through the Zenmap graphical interface was straightforward. However, transferring the deliverable files (the intense scan and the ping scan) to my local system proved to be a little challenging. It took me a few tries to successfully do it.
Lessons learned
This exercise showed me how easily a hacker could gain control of your system without privileged access. It is fascinating how tools meant to protect networks and devices (like Nmap and TNS) can be used by hackers to harm your computer. It also showed me a step by step process of how to enter a vulnerable system. I can use this knowledge to protect my computers better. For example, I can use this scanning process to carry out a regular ping and full scans of my systems to identify and close any vulnerabilities. I can also advise my friends and families on how to protect their networks and devices better.
Reference
Baloch, R. (2017). Ethical hacking and penetration testing guide. CRC Press