Solution for the problem is provided below, please
comment if any doubts:
Pen test or penetration test:
- It is a legal and sanctioned attack on a computer system as
actual attacker did without knowing more details about the network.
Also the low and middle level employees may be unaware of such a
testing is going on.
- The pen test is conducted to find the vulnerabilities of the
system in a real time environment.
During the scan an active break-in from with-in the
organization is discovered, then the actions needed to be followed
are:
- The break-in active and it is from within the organization, so
first find the source of attack and reach of attack.
- Then inform the reporting agents about the active-break in from
the organization and suggest the solution to seal it immediately
and take actions against those who are responsible for it.
- Now trace the log from the suspected peoples and inspect it for
the history of activities and break-ins to the system.
- Trace the other system for a similar break-in attempts or past
break-ins.
- Report the findings to the authorities to help them to secure
the system and also to initiate actions against the intruders.