This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cyberse...
This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas,...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The...
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external th...
In today's distributed computing environment where computer networks and Internet are convenient med...
Vulnerability assessments and penetration testing are two approaches available for use by internet s...
Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated a...
When it's all said and done, penetration testing remains the most effective way to identify security...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
A network security assessment is the process of determining how effectively a network being assessed...
In today’s computer networking and industrial networking, security holds a significant role in keepi...
This paper will focus the on research and testing done on penetrating a network for security purpose...
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
This paper gives an overview of the methodology of penetration testing and the tools used. This auth...
This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas,...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The...
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external th...
In today's distributed computing environment where computer networks and Internet are convenient med...
Vulnerability assessments and penetration testing are two approaches available for use by internet s...
Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated a...
When it's all said and done, penetration testing remains the most effective way to identify security...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
A network security assessment is the process of determining how effectively a network being assessed...
In today’s computer networking and industrial networking, security holds a significant role in keepi...
This paper will focus the on research and testing done on penetrating a network for security purpose...
As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information...
Vulnerability of computer systems in campus- wide network has been an issue for years, since network...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
This paper gives an overview of the methodology of penetration testing and the tools used. This auth...
This era is posing a unique challenge to the Cybersecurity and related Engineering Technology areas,...
Because the Internet makes human lives easier, many devices are connected to the Internet daily. The...
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external th...