Please read the instructions and let me know if you have any questions. I provided the screenshots that need to be added to the template as well as examples of other projects so can see what is expect

Scenario

You and your team members are penetration testers at Haverbrook Security Lab. Your current client is Hotel Dorsey. 

You will use Kali, a Linux distribution for penetration testing, to scan the company’s Linux system, which is running network services and database applications. A penetration tester must know how to scan a target machine to discover what vulnerabilities might be present on the remote system.  

It is critical to understand that during this phase of the project, no exploitation of the remote systems is permitted. The scope of work allows for scanning but not any type of exploitation at this time. Serious consequences, like criminal charges, could result in a real-world engagement if the contractor goes beyond the agreed scope of work. 

Hotel Dorsey has given you permission to scan its system using Nmap, Zenmap, OpenVAS, as well as any of the tools available on the Kali distribution that your contractor provided. The client is looking for information about critical vulnerabilities, banner messages, and application versions. If you feel that the client’s systems are not vulnerable or not at risk, it is your duty to report that as well. If you find critical issues within the client’s system, you need to convey these issues well so the client will consider expanding the scope of work and amend the contract. Even if there are many security issues, management will not take them seriously if your report does not specify those issues and their urgency. 

At this point, you should realize that having the best keyboard penetration skills in the business will not help you if you are not able to properly document your findings and convey the critical issues to the client. This is your task in Project 1, the System Scan Report.