Explain the vulnerability of port 80, what service it is providing

Words: 271
Pages: 1
Subject: Uncategorized

Lab instruction – Part I Configure all devices on isolated network using 192.168.77.0/24 network. Make sure all devices can ping each other before proceeding. Disable all NICs exept usb NIC for use on lab, especially when actively scanning. Using Kali and some of the scans shown last in class, target the windows 7 device. Scan for open ports etc. You will need to run 3 separate scan and interpret the results in a lab write up. If you are working with a partner you will need to provide 3 unique scans and write-ups, you and your partner will have separate submissions. The write up will consist of a screen shot of the scan itself and the results. You will need to explain what that scan looks for and explain each result given with technical persective. in other words, stating ″port 80 is open″ is not an explanation. Explain the vulnerability of port 80, what service it is providing etc. Lab Instruction – Part II Change your target machine to the snort system. Run the same three scans, compare and contrast the results to that of Win7. Research the rules/alerts that are enabled or would need to be enabled to notify system admins of such scans.

Let Us write for you! We offer custom paper writing services Order Now.

REVIEWS


Criminology Order #: 564575

“ This is exactly what I needed . Thank you so much.”

Joanna David.


Communications and Media Order #: 564566
"Great job, completed quicker than expected. Thank you very much!"

Peggy Smith.

Art Order #: 563708
Thanks a million to the great team.

Harrison James.


"Very efficient definitely recommend this site for help getting your assignments to help"

Hannah Seven