Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

2 Subjects

Week 2 Lab Report

Week 2 Lab Report

Q Student Name: Week 2 Lab Report You are expected to do the labs assigned this week and to post your observations using this Word document in Blackboard. • Indicate what you did to achieve the desired goal, problems encountered, problem resolution, and lessons learned. • Include references that facilitated your understanding and problem solving. This Week’s Assignment has two parts (at least 750 words for the whole report – that includes Part One and Two) Part One: Use the attached the Week 2 Lab Projects document to guide you with this week’s lab. Submit this document in Blackboard showing the work you did to complete the assignment. As you conduct the lab exercises, provide clear screenshots with comments describing what each screenshot displays. After completing the labs, please describe any problems that you encountered, how you resolved these problems, and what you learned from the labs. Be sure to include references that facilitated your understanding and problem solving.

Q Research the following bulleted items below, using the relevant reading resources for this week and supplementary ones you may come up with: • Explain how FTP servers can be vulnerable to attackers. What can you do mitigate these vulnerabilities? • List recommendations for hardening your FTP servers and updating your security policy to make your FTP servers more secure. • Explain how Nmap can be used to detect how attackers may be trying to evade your organization’s firewalls and intrusion detection and prevention systems (IDPS).

View Related Questions

Solution Preview

Step 14, I was able to run the Tshark command and had no issue loging into the FTP server and transferring file to windows vm but when I checked contents of C:\FTPcapture.txt, it was empty. I retried the process multiple times but with the same result. Still have not idea why there was no information in that file.1. Anonymous authentication - This allows users to login without a user name or anonymously. 2. Cross site scripting (XSS) - This vulnerability allows hackers to set a malicious code in the form of browser side Scripps.