Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Risk Analysis
Performing A Penetration Test On A Storage Network, Scott Moskal
Performing A Penetration Test On A Storage Network, Scott Moskal
Williams Honors College, Honors Research Projects
A small storage network will be designed with two wired routers, one wireless router, a switch, two laptops, a desktop, and a Raspberry Pi. Both laptops will be connected to the wireless router. The HP laptop will run Parrot OS and the Acer laptop will run Windows 11. The wireless router will be connected to the second router via port eth0. The eth2 port on the second router will be connected to eth1 port of the third router. The third router will be connected to the eth0 port of the Netgear switch. The switch will have two VLANs. VLAN 10 …