After collecting enough information about the target during Deliverable 2 (Reconnaissance and Scanning Plan), you will describe how to use that information to gain access to Haverbrook’s systems. Your one- to two-page plan on gaining access should include:
As you are developing the Gaining Access Plan, keep these questions in mind:
Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.Â
Use the Gaining Access TemplateÂ to record your work. Please submit your workÂ to the LEO submission box below.Â
Penetration Test Proposal
Deliverable 3: Gaining Access Plan
Course Number and Section:
Provide a summary of the Gaining Access phase.
Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD.
Techniques and Software
Provide the techniques and any software, applications, or scripts that will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information.