Write a paper on the results of the lab below – will post the results of the scans to help with the paper
Question Description
The continued reports about compromises and data exfiltrations concern our CISO. The CISO is deeply
concerned about our Product Innovation Lair’s Lab (PILL) now that it has been upgraded. You can only
get access to the PILL in the CSL. The PILL network is located at 192.168.101.150-205.
Take care to not access anything below 150 as it will be logged and ensure you get no credit for this
work. Using the Kali2 virtual machine scan the 150-205 range to see what boxes are on PILL and what
may or may not be vulnerable. Then use any other tools you choose on the Kali2 VM to determine risks
on PILL. But remember, the goal is not to exploit any of the machines on PILL. If you use a tool that
exploits machines on PILL you may have points deducted. You can only access the internet in the seat
(the even numbers) next to the target range machines if you need to do online research. You can login
with your CSL accounts (firstname.lastname) on those machines.
Special notes:
1) Access to the Target Range (TR). 2) All machines with TR access are identifiable with a sheet reading Target Range on the monitor
3) If the station is open and available, sit down and flip the sheet to the back of the monitor and log in
with the .MIL1 account on the whiteboard 5) Verify that you are on the correct network by placing the mouse icon above the network icon in the
SYSTRAY prior to starting the exercise/project/homework. It should read Enterprise.net
6) Continue with your work to completion
7) If you compromise any machine on the Enterprise.net network, please inform a Lab Assistant
immediately so they can reset the compromised machine
8) When finished please pull the Target Range paper back over to the front of the monitor so that
additional students entering the lab can also access the correct network.
Papers will be 5-7 single-spaced pages in length (font size
12). The title page does not count as one of the pages for the report. Proper referencing is a must. The
bibliography will not count as one of the page requirements. Appendices will not count as pages for the
report and should contain supporting comments you make in the paper—like detailed vulnerability
data(use the paper to present summary data). All references will be properly cited throughout the report.