Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

The University of Akron

Cybersecurity

Articles 1 - 1 of 1

Full-Text Articles in Risk Analysis

Performing A Penetration Test On A Storage Network, Scott Moskal Jan 2022

Performing A Penetration Test On A Storage Network, Scott Moskal

Williams Honors College, Honors Research Projects

A small storage network will be designed with two wired routers, one wireless router, a switch, two laptops, a desktop, and a Raspberry Pi. Both laptops will be connected to the wireless router. The HP laptop will run Parrot OS and the Acer laptop will run Windows 11. The wireless router will be connected to the second router via port eth0. The eth2 port on the second router will be connected to eth1 port of the third router. The third router will be connected to the eth0 port of the Netgear switch. The switch will have two VLANs. VLAN 10 …