Determining Possible Vulnerabilities of Microsoft CA Root Server In conducting security testing on the Alexander Rocco network, you have found that the company configured one of its window server 2016 computers as an enterprise root CA server. You have also determined that Ronnie Jones , the administrator of the CA server, selected MD5 as the hashing algorithm for creating digital signatures. Based on this information , write a one page report explaining possible vulnerabilities caused by signing certificates with MD5. The report should cite articles about MD5 weaknesses and include recommendations from Microsoft about using MD5 in its software.
Case Project 13-2: 1 page double spaced memo
You receive a frantic call from the system administrator of the Alexander Rocco Network, JW Tabacchi. He tells you he has identified several intrusion attempts from sources over the internet. You’re not sure if the hackers have gained access to the internal network. First, based on the tools described in this chapter and some techniques you’ve learned in this book , write a one page report about the things you might look for to identift an attacker or a compromised host on your network. Second, make some recommendations on how you might instrument the network with network protection systems to better direct and prevent compromises in the future.