Professional Documents
Culture Documents
Cases
By (Name)
Course
Date
2
Memo
From: (Name)
Date:
addressed by you or a higher-up. Enumerating and the Open Source Security Testing
Methodology were two methods I used for testing (OSSTM). In this memo, I'll explain how I
First, I utilized the Windows NetBIOS Enumeration Tools. And one of Windows' native
tools is named net view. Nbstat – an IP address and net view command to display the NetBIOS
Table was used to identify several Windows workstations with shared folders for the Help Desk
Department.It was entered into the command prompt window. In the Excel file, I found the
email addresses and passwords of all of the company's employees. Afterwards, I discovered that
your NetBIOS systems were vulnerable to one of the most dangerous faults known to man. Data
from your Help Desk is collected using unauthenticated connections to Windows devices in this
"null session."
security weaknesses can be discovered through the use of malicious techniques that probe the
system or network. A system's weak areas are exploited through a simulated assault that has been
approved by the system's developers. Once a system's vulnerability has been identified, it is
exploited to gain access to sensitive data. So I contacted the help desk and explained that I was
3
outside the office and could not recall my email password. The individual requested my email
address and gave me the password without verifying my identity. I advise you to restrict access
to this folder by right-clicking the Start button and selecting File Explorer. Double-click Local
Disk (C:) and locate the Help Desk Department's shared folders. Right-click the folder, then
select Share with, followed by Specific People. In the Properties dialogue box, enter only the
names of people you believe should have access to this information. Or you can prohibit
Respectfully,
(Name)
4
INTERNAL MEMO
ROCCO CORPORATION
To: Supervisor
From:
Date:
On the network, we would like to run the enum4linux tool. This software is used to
utility that can detect and retrieve information from Windows and Linux computers and Samba
• Share numbering
This software allows us to gather OS information without requiring the user to provide
credentials and lists shares on a server that requires credentials. Since we do not pose a threat to
the company, we believe this tool will help us perform our job duties more quickly and provide
Respectfully,
(Name)