April 22, 2023, 8:32 a.m. | Ahmet Talha Şen

System Weakness - Medium systemweakness.com

Objectives

Part 1: Investigate a Network Configuration Vulnerability

Part 2: Investigate a Phishing Malware Vulnerability

Part 3: Investigate a Wireless Network and DNS Vulnerability

Background / Scenario

In this Packet Tracer (PT) activity, you will investigate three vulnerabilities that can be exploited by threat actors.

Note: In this activity, both the Data Center and ISP/Telco sites are locked

Part 1: Investigate a Network Configuration Vulnerability

Step 1: Use a guest network to gain access to other devices on the …

cisco cisco-packet-tracer cybersecurity networking network security packet threat threat landscape

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information System Security Engineer 2

@ Wyetech | Annapolis Junction, Maryland

Staff Vulnerability/Configuration Management Security Engineer

@ ServiceNow | Hyderabad, India

Security Engineer

@ AXS | London, England, UK