INSTRUCTIONS:
Vulnerability and Attack Analysis Plan For this you will assess an organization(choose one), collect information, pinpoint vulnerabilities and come up with an attack plan that should work in theory. This is not meant to be carried out but is meant to build a plan that will be used without actually taking the steps to perform the attack. The Attack report/paper will be a report of an analysis and attack strategy. 1. First you will report the information you gathered on the organization. 2. Then you will list the tools, give a details description of each and give a description of how you used it. 3. What sort of attacks would work in this case? Give some examples and how you would carry them out. 4. What social engineering and physical security aspects were discovered/devised? Give a detailed explanation. 5. With all of these methods for finding information, using it to gain access to the organizations systems; what methods could you employ to help secure these vulnerabilities? What suggestions would you make to the organization if you were a penetration tester?