SlideShare a Scribd company logo
1 of 2
Chapter 10: Case Project 10-2: two page report double space
Case Project 10-2: Discovering Web Application Attack Tools
After discovering that Alexander Rocco Corporation has
multiple Web servers running on different platforms, you
wonder whether your security tools can asses Web applications
vulnerabilities throughly. You have only two tools for
conducting Web security tests: Wapiti and Wfetch. Based on the
information write a two page report on other tools for security
testers conducting Web applications vulnerability testing. Use
the skills you have gained to search the Internet and explore the
Kali DVD to find tools for Windows and *nix platforms. The
report should state the tool's name, describe the installation
method, and include a brief description of what the tool does.
Chapter 11: Case Project 11-1- one-page report
Case Project: Determining Vulnerabilities of Wireless Networks
After conducting a security test on the Alexander Rocco
network, you discover that the company has a wireless router
configured to issue IP addresses to connecting stations.
Vistumbler indicates that channel 6 is active, the SSID is
linksys, and WEP is enabled. Based on this information, write a
one-page report listing possible vulnerabilities of the WLAN’s
current configuration. Your report should include
recommendations for improving wireless security.
Chapter 10 Case Project 10-2 two page report double spaceCas.docx

More Related Content

Similar to Chapter 10 Case Project 10-2 two page report double spaceCas.docx

Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.comUOPCourseHelp
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.comUOPCourseHelp
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday AnalysisIvanti
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Vulners: Google for hackers
Vulners: Google for hackersVulners: Google for hackers
Vulners: Google for hackersKirill Ermakov
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsAndrea Bissoli
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Installing and Configuring the Access Grid Toolkit (AGTk) 2
Installing and Configuring the Access Grid Toolkit (AGTk) 2Installing and Configuring the Access Grid Toolkit (AGTk) 2
Installing and Configuring the Access Grid Toolkit (AGTk) 2Videoguy
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxYousef Al-Mutayeb
 
Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdftrishacolsyn25353
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
Conclusion for rain technology
Conclusion for rain technologyConclusion for rain technology
Conclusion for rain technologynarayan dudhe
 
OWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsOWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsInternet Security Auditors
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 

Similar to Chapter 10 Case Project 10-2 two page report double spaceCas.docx (20)

Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
 
November Patch Tuesday Analysis
November Patch Tuesday AnalysisNovember Patch Tuesday Analysis
November Patch Tuesday Analysis
 
News bytes Oct-2011
News bytes  Oct-2011News bytes  Oct-2011
News bytes Oct-2011
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Vulners: Google for hackers
Vulners: Google for hackersVulners: Google for hackers
Vulners: Google for hackers
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Installing and Configuring the Access Grid Toolkit (AGTk) 2
Installing and Configuring the Access Grid Toolkit (AGTk) 2Installing and Configuring the Access Grid Toolkit (AGTk) 2
Installing and Configuring the Access Grid Toolkit (AGTk) 2
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 
Attacking antivirus
Attacking antivirusAttacking antivirus
Attacking antivirus
 
Respond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdfRespond to the following by writing at least one paragraph for each .pdf
Respond to the following by writing at least one paragraph for each .pdf
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
News Bytes - May by corrupt
News Bytes - May by corruptNews Bytes - May by corrupt
News Bytes - May by corrupt
 
INTSUM
INTSUMINTSUM
INTSUM
 
Conclusion for rain technology
Conclusion for rain technologyConclusion for rain technology
Conclusion for rain technology
 
OWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsOWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application Assessments
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 

More from zebadiahsummers

Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxChapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxzebadiahsummers
 
Chapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxChapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxzebadiahsummers
 
Chapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxChapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxzebadiahsummers
 
Chapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxChapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxzebadiahsummers
 
Chapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxChapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxzebadiahsummers
 
Change is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxChange is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxzebadiahsummers
 
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxChapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxzebadiahsummers
 
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxChapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxzebadiahsummers
 
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxChapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxzebadiahsummers
 
Changes in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxChanges in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxzebadiahsummers
 
Chapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxChapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxzebadiahsummers
 
chapter 8 notes – Asian Americans model minoritieschapter b.docx
chapter  8 notes – Asian Americans model minoritieschapter b.docxchapter  8 notes – Asian Americans model minoritieschapter b.docx
chapter 8 notes – Asian Americans model minoritieschapter b.docxzebadiahsummers
 
CHAPTER 1 This list below indicated various audits, attestation,.docx
CHAPTER 1  This list below indicated various audits, attestation,.docxCHAPTER 1  This list below indicated various audits, attestation,.docx
CHAPTER 1 This list below indicated various audits, attestation,.docxzebadiahsummers
 
Challenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxChallenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxzebadiahsummers
 
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxChamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxzebadiahsummers
 
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxChamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxzebadiahsummers
 
Centralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxCentralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxzebadiahsummers
 
Challenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxChallenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxzebadiahsummers
 
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxCh.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxzebadiahsummers
 
Central Sierra Insurance (CSI) sets bonus percentages based on c.docx
Central Sierra Insurance (CSI) sets bonus percentages based on c.docxCentral Sierra Insurance (CSI) sets bonus percentages based on c.docx
Central Sierra Insurance (CSI) sets bonus percentages based on c.docxzebadiahsummers
 

More from zebadiahsummers (20)

Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxChapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
 
Chapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxChapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docx
 
Chapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxChapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docx
 
Chapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxChapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docx
 
Chapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxChapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docx
 
Change is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxChange is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docx
 
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxChapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
 
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxChapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
 
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxChapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
 
Changes in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxChanges in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docx
 
Chapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxChapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docx
 
chapter 8 notes – Asian Americans model minoritieschapter b.docx
chapter  8 notes – Asian Americans model minoritieschapter b.docxchapter  8 notes – Asian Americans model minoritieschapter b.docx
chapter 8 notes – Asian Americans model minoritieschapter b.docx
 
CHAPTER 1 This list below indicated various audits, attestation,.docx
CHAPTER 1  This list below indicated various audits, attestation,.docxCHAPTER 1  This list below indicated various audits, attestation,.docx
CHAPTER 1 This list below indicated various audits, attestation,.docx
 
Challenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxChallenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docx
 
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxChamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
 
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxChamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
 
Centralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxCentralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docx
 
Challenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxChallenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docx
 
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxCh.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
 
Central Sierra Insurance (CSI) sets bonus percentages based on c.docx
Central Sierra Insurance (CSI) sets bonus percentages based on c.docxCentral Sierra Insurance (CSI) sets bonus percentages based on c.docx
Central Sierra Insurance (CSI) sets bonus percentages based on c.docx
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Chapter 10 Case Project 10-2 two page report double spaceCas.docx

  • 1. Chapter 10: Case Project 10-2: two page report double space Case Project 10-2: Discovering Web Application Attack Tools After discovering that Alexander Rocco Corporation has multiple Web servers running on different platforms, you wonder whether your security tools can asses Web applications vulnerabilities throughly. You have only two tools for conducting Web security tests: Wapiti and Wfetch. Based on the information write a two page report on other tools for security testers conducting Web applications vulnerability testing. Use the skills you have gained to search the Internet and explore the Kali DVD to find tools for Windows and *nix platforms. The report should state the tool's name, describe the installation method, and include a brief description of what the tool does. Chapter 11: Case Project 11-1- one-page report Case Project: Determining Vulnerabilities of Wireless Networks After conducting a security test on the Alexander Rocco network, you discover that the company has a wireless router configured to issue IP addresses to connecting stations. Vistumbler indicates that channel 6 is active, the SSID is linksys, and WEP is enabled. Based on this information, write a one-page report listing possible vulnerabilities of the WLAN’s current configuration. Your report should include recommendations for improving wireless security.