Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Penetration testing rules of engagement example

28/10/2021 Client: muhammad11 Deadline: 2 Day

Ethical Hacking Assignment
.
.

Start for Project 1:

For the next eight weeks, you will play the role of a penetration tester for a fictional company, Centralia Security Lab. Your task is to develop a penetration testing proposal for your new client, Haverbrook Investment Group, while also working toward gaining the knowledge required for the Certified Ethical Hacker certification.

Scenrio:

Welcome to Centralia Security Lab!

logo for Centralia Security Lab

Centralia Security Lab has been hired by Haverbrook Investment Group to perform penetration testing on its systems. As a pen tester, you have been assigned to write the plan for what Centralia will do in the testing.

Your proposal should include the "rules of engagement" (agreement outlining the framework for the penetration testing) and outline how you would go through the five phases of hacking.

Proposal Overview

Previous Next

A penetration test includes various activities to identify and exploit security vulnerabilities. Such a test can determine whether security measures are effective.

The process of penetration testing includes planning the test, collecting information and performing the tests, analyzing the information found, and finally, writing up and communicating your findings. This assignment focuses on the planning phase as you will be outlining what steps you would plan to take if you were to conduct a pen test.

Your proposal will be submitted in four deliverables. The final deliverable will include all the sections combined:

· Rules of Engagement (Week 1)

· Reconnaissance Plan and Scanning Plan (Week 3)

· Gaining Access Plan (Week 5)

· Maintaining Access Plan, Covering Your Tracks Plan, and Final Report (Week 7)

Haverbrook Investment Group, L.L.L.P.
Haverbrook Investment Group L.L.L.P. (HIG) was established in 1935 by Mark Haverbrook as a small-town bank located in Largo, Maryland. Because Mr. Haverbrook believed the customer always comes first, HIG has grown to 350 locations across the United States of America. Beth Haverbrook, granddaughter of Mark Haverbrook, is the current chief executive officer.

Haverbook specializes in financial services, offering a wide range of products, including loans, investment services, insurance, and personal banking.

Haverbrook Investment Group L.L.L.P. (HIG) files annual, quarterly, and current reports along with other information required by the Securities and Exchange Act of 1934, as amended with the Securities Exchange Commission (SEC).

Industry: Financial Services

HQ location: Largo, MD

Employees: 8,738

Global Revenue: $9.7 billion

Total Customers: 8.5 million

Total Products: 25 million

Haverbrook Investment Group, L.L.L.P. Organization chart with the CEO over the CIO, CISO, CFO, Director of HR, and the Director of Marketing. The System Admin reports to the CIO and CISO. The Controller and Director of Finance reports to the CFO. Admin reports to the Director of HR. The Creative Team reports to the Director of Marketing.

Haverbrook Investment Group, L.L.L.P. Organization Chart

Your second project deliverable will be due in Week 3. It will be two to four pages in length and will contain a Reconnaissance Plan and a Scanning Plan. We recommend starting the assignment this week by developing the Reconnaissance Plan. Next week, you can write the Scanning Plan.

he five phases of hacking; reconnaissance, scanning, gaining access, maintaining access, and covering your tracks. The reconnaissance phase is highlighted.

Project 1: Rules of Engagement (Question)

Instructions
The first deliverable of the Penetration Test Proposal is the rules of engagement (ROE) document, a formal document that outlines the objectives, scope, methodology, and overall test plan agreed upon by the penetration testers and client system administrators. Penetration testing can cause complications such as network traffic congestion, system downtime, and may cause the same vulnerabilities and compromises it was designed to prevent. Due to the potential consequences of penetration testing, it is vital to agree upon a comprehensive ROE before testing.

For your ROE deliverable, consider the following:

· How will you identify Haverbrook Investment Group's network characteristics, expectations, constraints, critical systems, and other relevant information?

· What are your preliminary engagement activities with regard to scheduling, scope, and key stakeholders?

· What will you use to establish a binding agreement between Centralia Security Lab and Haverbrook Investment Group?

· How will you determine the services, targets, expectations, and other logistics that will be covered during the Rules of Engagement section?

· How will you explain to Haverbrook that the tools and techniques to be used in the penetration test will not corrupt data, violate privacy, and are in compliance with industry standards and any applicable laws and regulations?

Use the Rules of Engagement Template to record your work.

Please submit your work to the LEO submission box below.

Start for Project 2:

Scenario:

Active Reconnaissance

logo for Centralia Security Lab

Now that you have set the rules of engagement for your penetration test of Haverbrook Investment Group's system, you can begin planning the first phase of hacking, reconnaissance, for your proposal. These activities will help you gain insight into your target, Haverbrook Investment Group.

Here, you will engage in active reconnaissance, including gathering information to create a blueprint or map of the target's network and systems. You will also want to check the latest vulnerabilities on lists such as the National Vulnerability Database (NVD) and the levels of severity as defined by the Common Vulnerabilities and Exposures (CVE) list to see if anything applies to Haverbrook's systems.

The next deliverable will describe your plans for the scanning phase of hacking.

The five phases of hacking; reconnaissance, scanning, gaining access, maintaining access, and covering your tracks. The scanning phase is highlighted.

Scenario:

Scanning

logo for Centralia Security Lab

You have just completed your reconnaissance plan describing how you would gather information on Haverbrook Investment Group. Now you will continue your Penetration Test Proposal by submitting your plans for scanning the target systems.

In this phase, you know you have to execute more specific scanning methodologies to identify targets of opportunity and vulnerabilities to be exploited.

As a pen tester, you are going to continue to scan for vulnerabilities, test for open ports, and check for live systems. You know a few ways to do this, including performing IP sweeps, which might include protocols such as ICMP, UDP, and TCP, or using techniques such as banner grabbing or OS fingerprinting.

Ultimately, you know that to exploit Haverbrook's systems, you need a structured and ordered approach.

Project 2: Reconnaissance and Scanning Plans
Instructions
Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Group's systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrook's systems.

As you are developing the Scanning Plan, keep these questions in mind:

· How would you detect active systems?

· How would you determine the best attack vector you wish to exploit?

· How would you prioritize different targets of opportunity?

· What tools would you be using for scanning and enumeration of systems and vulnerabilities?

Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems.

Use the Reconnaissance and Scanning plans template from last week to finish your deliverable.

When you are finished with both your Reconnaissance and Scanning plans, upload it to the LEO submission box below.

Start of Project 3

This week, you can begin thinking about how you gain access to the target systems.The five phases of hacking; reconnaissance, scanning, gaining access, maintaining access, and covering your tracks. The gaining access phase is highlighted

Scenario:

Gaining Access

logo for Centralia Security Lab

Up to this point, as a pen tester for Centralia Security Labs, you have set the rules of engagement, detailed how you plan to collect all the cyber intelligence needed, and mapped Haverbrook's network by scanning its systems.

Now, you can begin to plan how you would gain access to the target systems. You know that there are many open source and commercial tools available to gain access. You could also create custom exploits using programming languages.

Scenario:

Accessing Networks and Applications

logo for Centralia Security Lab

You have been proactive as a pen tester for Centralia Security Lab. You have exploited the network and taken control of a system within the target environment. As an effective penetration tester, you also know that you need to figure out how to maintain control of the system. To have a clear execution plan, you need to think about the best techniques and procedures when pivoting to obtain access and control of the targeted system.

You know that you have to be careful because if your actions are detected, network security administrators will isolate you and ultimately remove you from their network. Once you alert them, gaining access again becomes much more difficult.

Now you can finalize the specifics of how you would gain access to the target systems. Your report will include how you plan to collect enough information to access Haverbrook's systems, web applications, and networks, including the target resources you would focus on and techniques you would use to gain access to them.

Project 3: Gaining Access Plan

Previous Next

Instructions
After collecting enough information about the target during Deliverable 2 (Reconnaissance and Scanning Plan), you will describe how to use that information to gain access to Haverbrook's systems. Your one- to two-page plan on gaining access should include:

· details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.

· an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.

As you are developing the Gaining Access Plan, keep these questions in mind:

· How would you escalate your privileges?

· How would you establish a command and control communication channel?

Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.

Use the Gaining Access Plan template to record your work. Please submit your work to the LEO submission box below.

Start of Project 4:

Scenario:

Maintaining Access

logo for Centralia Security Lab

Now that you have come up with a plan to gain access to Haverbrook's target systems, it's time to start planning how you will maintain that access once you get it.

You know that attempt will be useless unless you can not only extract the information you were looking for but stay unnoticed, and you also need to able to get back inside as needed.

A big part of managing a network is to secure it; therefore, you should take nothing for granted. You have to have a well-defined plan to get back into the target environment at will; second chances are much harder since they will be expecting you at that point.

As a penetration tester, you need to figure out how you will maintain control of the system. To have a clear execution plan, you need to think about the best techniques and procedures when pivoting to obtain main access and control of the targeted system.

Some of the command and control techniques you may use are methods of pivoting, such as elevation of privilege, password cracking, impersonation, DNS cache poisoning, and IP spoofing.

It's now time to describe the plans for the final phases of hacking, including how you will maintain access and cover your tracks.

The five phases of hacking; reconnaissance, scanning, gaining access, maintaining access, and covering your tracks. The covering your tracks phase is highlighted.

Scenario:

Covering Your Tracks

logo for Centralia Security Lab

Your penetration test into Haverbrook's systems is nearly complete. After planning how you would exploit the target's network, now you have to consider how you would cover your tracks within those systems. Your training and experience provides you with options to do so.

You know there are tools available in the operating system to perform cleanup. For instance, you can hide any malicious files introduced during exploitation by using steganographic techniques or NTFS streams to maintain future access to the target.

Additionally, you will make sure all the point of entries are accounted for, and you will keep track of any modifications you made. You will remove any malware, tools, or other nonnative files you placed on the system. You know that you can delete these files throughout an intrusion, keeping your footprint low, or remove them as part of the postintrusion cleanup process.

You will put all of the details of your penetration test into a final proposal to be delivered to Haverbrook's stakeholders.

Project 4: Final Penetration Test Proposal

Previous Next

Instructions
In the Final Penetration Test Proposal Template, add previous submissions, make updates and corrections based on the feedback received from your instructor, and add the Maintaining Access and Covering Your Tracks plans.

So, your final proposal will include the following components:

· Rules of Engagement (from Deliverable 1)

· Reconnaissance Plan (from Deliverable 2)

· Scanning Plan (from Deliverable 2)

· Gaining Access Plan (from Deliverable 3)

· Maintaining Access Plan (New)

· Covering Your Tracks Plan (New)

Use the Final Penetration Test Proposal template to complete your work.

Please submit your work to the LEO submission box below.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Online Assignment Help
Math Specialist
Peter O.
Professional Coursework Help
Quick N Quality
Buy Coursework Help
Writer Writer Name Offer Chat
Online Assignment Help

ONLINE

Online Assignment Help

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$19 Chat With Writer
Math Specialist

ONLINE

Math Specialist

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$41 Chat With Writer
Peter O.

ONLINE

Peter O.

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$49 Chat With Writer
Professional Coursework Help

ONLINE

Professional Coursework Help

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$37 Chat With Writer
Quick N Quality

ONLINE

Quick N Quality

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$42 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$24 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

When i heard the learn d astronomer questions and answers - Guo nian hao translation - What is the difference between fraud and abuse - Response to each postings 150 word count minimum. - J&l railroad case study solution - 3 bit magnitude comparator verilog code - Where do squids live in the ocean - Romeo and juliet act 2 study guide answers - Determination of water hardness by edta titration calculations - Biology 1 - Critical issues in education dialogues and dialectics 8th edition - Ward 7d royal north shore hospital - Teaching line breaks in poetry - Australian treatment outcome profile - Clinical reasoning strategies in physical therapy - 53 robinsville crescent thirroul - Calvary pandan bible presbyterian - What is your vision, your values and your mission? Assignement solved completely Fundamentals of innovation entrepreneurship - Legal Ethical - Derivatives using power rule worksheet answers - Tm 9 1015 260 10 pdf - Discussion - Simms minimec injector pump manual - Acadamh na hollscolaíochta gaeilge - Biographical criticism essay examples - Business government and society steiner pdf - Prowarm underfloor heating manual - Security Data - Hey diddle diddle the medians the middle - Human resource management byars and rue 11th edition pdf - Events that make a conflict more difficult are called - Tyler company acquired all of jasmine company's outstanding stock - Manzana insurance process flow diagram - 632wk3A3 - Graphpad 6 serial number - In the sentence "i want to sleep when i'm tired," the words "to sleep" are a/an - Anne frank compare and contrast essay - Bayonne packaging case study solution - Among us hacks download - Acrostic poems for kids - Mathematics - How to make a pill bug habitat - Only Bethuel best 12 - Carmex leveraging facebook for marketing research - Root cause analysis engstrom auto mirror plant - Haydn c major cello - Gsxr 750 rr 1989 - Next generation portable gaming console - Ilana industries inc needs a new lathe - History of television ppt - Respond to at least two of your colleagues* on two different days by suggesting additional opportunities or recommendations for overcoming the challenges described by your colleagues. - Csp bonded school leaver entry - The underground railroad quotes with page numbers - Evan company reports net income of - Mirabilis jalapa in marathi - Discussion question, 150 words minimum, 2 recent reference citations(2019-2020) - Behavior of gases lab report - My lips two blushing pilgrims ready stand metaphor - Discussion on French colonialism - 6es7 138 4fa05 0ab0 hardware update - Mood of annabel lee - Business process integration wiki - Ati stands for nursing - A shopper in a supermarket pushes a cart - Response addressing - Leighton vander esch thad castle - Govc sean brown net worth - Center pivot design program - Understand how the Brain copes from adverse Childhood Experience - Big mama's chicken st agnes - Malmesbury school staff list - What hotel chain owns ritz carlton - Introduction to Sociology - Public policy proposal for nuclear waste - Is flaxseed alkaline or acidic - Federal statute utilizing standard legal notation - Theory of nursing systems orem - Colgate cmcp san - Need in 24 hours - Romer v evans 1996 was a victory for __________ - Crowne plaza limassol email - Volume of rectangular box - Holey plains state park - Turnitin purdue global - Bus 380 discussion question - Responsibility accounting and transfer pricing ppt - Practical Connection Assignment - Writing a purpose statement for research - Financial data for beaker company for last year appear below - Need 400- 500 words on the following topic - 5 steps in college writing process university of phoenix - Army sharp essay - 2 reports each 2 pages due on 23rd before 2;00 pm est - What is the average cost of a stitch fix box - Rapid electronics christmas tree kit - Mentoring program design and reflection - What are some practical applications of freezing point depression - Owner of koi bubble tea - Esol nexus every day - Esio trot worksheets activities