Preview

ISSC362 Lab 4 Assessment

Satisfactory Essays
Open Document
Open Document
412 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC362 Lab 4 Assessment
ISSC362 Week 2 Lab #4:
Compromise and Exploit a Vulnerable Microsoft® Workstation
Instructor Name: ________________

Lab Assessment Questions

1. What are the five steps of a hacking attack?
1—Reconnaissance
2—Scanning
3—Gaining Access
4—Maintaining Access
5—Covering Tracks

2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting. It sends commands to the platform-specific nmap executable and pipes the output back. Zenmap uses Profiles which are basically nmap parameter presets to specify how scans are performed.
3. 2
3. What step in the hacking attack process uses Zenmap GUI?
System Hacking
4. What step in the hacking attack process identifies known vulnerabilities and exploits?
Enumeration

5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?
Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. The MS08-067 vulnerability could allow remote code execution if an affected system received a specially crafted RPC request.

6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server?
MS Server Service Relative Path Stack Corruption and Metasploit

7. What do If you were a member of a security penetration testing team, and you identified vulnerabilities and exploits, should you obtain written permission from the owners prior to compromising and exploiting the known vulnerability?
Yes if you do not attain written permission from the owner then it is illegal hacking and can result in fines and/or jail time.

8. What does the tool Ettercap do?
Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What elements are needed in a workstation domain policy regarding use of anti-virus and malicious…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    7. What method does an attacker use to regain access to an already penetrated system?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    6. Name at least five different scans that may be performed from the Zenmap GUI. Document under what…

    • 362 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    4. Did the static analysis tool find all the potential security flaws in the application?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays