Running head: VULNERABILITY TESTS1Conducting a Vulnerability Analysis on a Specific HostAuthors NameProfessors NameCourse TitleDateVULNERABILITY TESTSConducting a Vulnerability Analysis on a Specific HostHost IP addressIPV4 Address2VULNERABILITY TESTSRouter IPV4AdapterThe computer uses a tunnel network adapter to connect to the networkOpen ports and ServicesThe screenshot above shows four open ports 5432, 5433, 80, and 68. Port 80 and 60associate with Apache and Dhclient services respectively while the other two identify withPostgres service. Port 68 is used by BOOTP and DHCP applications. Port 80, on the other hand,uses HTTP associated applications while 5432 identifies with the PostgreSQL database systemand 5433 is with Bouwsoft files. The applications use the correct ports as per the screen shotabove.3Name: Kali LinuxDescription:The com ...
To Order an Original Plagiarism Free Paper on the Same Topic Click Here
Other samples, services and questions:
When you use PaperHelp, you save one valuable — TIME
You can spend it for more important things than paper writing.