can you check file below

Perform a Penetration Test

Part 1

Do some reading on proprietary and open-source penetration testing tools, their features, and usefulness in different situations.  Select three of them and in a Word document, prepare a chart with the following information:

  • The name and publisher of the title

  • Licensing information and cost

  • Common uses (apps or environments) and major users

  • Major features that distinguish it from the others

Part 2

Select one product and run it against a target of your choice.  It’s recommended that you don’t try to penetrate a real-world production environment, so you might want to set up a local sandbox to hit instead.  Add the following items to your report:

  • Any output from the penetration test (reports, etc.)

  • A summary of vulnerabilities found (if any)

  • An assessment of these vulnerabilities, the probability of their exploitation, and the losses that could occur as a result

  • Actions that could be taken to mitigate the risks associated with the identified vulnerabilities.

Support your response and all factual assertions with appropriate scholarly or industry sources with proper citations in APA format.  Remember that opinions are fine but they must be rooted in facts.  Do not approach this as a journal entry filled with your stream-of-thoughts.  Do thorough reading on the topic before responding and use what you’ve read as evidence to support what you post.  Do not use Wikipedia or similar sites.  Do not use blog posts unless they are official publications of the relevant companies or their employees (e.g., Mark Zuckerberg’s blog would be an appropriate source for information about Facebook).

Format your submission according to the APA manual of style.