Preview

ISSC362 Week 2 Lab

Good Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC362 Week 2 Lab
1. What are the five steps of a hacking attack?
Reconnaissance , Scanning, Gaining Access, Maintaining Access , Covering Tracks
2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting.
Nmap uses the –O option to perform OS fingerprinting. The process monitors and captures network traffic. The traffic is then analyzed for patterns that would suggest which operating systems are in use.
3. What step in the hacking attack process uses Zenmap GUI? Scanning
4. What step in the hacking attack process identifies known vulnerabilities and exploits? Vulnerabilities and exploits are identified by enumeration, which is the most aggressive of the scanning stage.
5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?
MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873)
MS03-043: Buffer Overrun in Messenger Service (828035)
MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159)
MS03-039: Microsoft RPC Interface Buffer Overrun (824146)
MS04-011: Security Update for Microsoft Windows (835732)
MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687)
MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422)
MS02-045: Microsoft Windows SMB Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS (326830)
MS05-007: Vulnerability in Windows Could Allow Information Disclosure (888302)
Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.
6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt2670 Unit 7 Lab 1

    • 402 Words
    • 2 Pages

    1. Manages the application pool configuration and for the creation and lifetime of worker processes for HTTP and other protocols.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    analysis are either built into the operating system, or are available at no cost. Two such tools for…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    School

    • 629 Words
    • 3 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    3. What possible high risk vulnerabilities did the Rats tool find in the DVWA application source code?…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    form 1

    • 430 Words
    • 2 Pages

    The form also speaks about Vishing as a classified remote exploit because it exploits the security vulnerability without prior access to the system. When attackers take advantage of an exploit one of their first goals is to gain administrator or superuser, one of the programs they use is called coreflood, is a superuser and a records keystrokes and capture screen information including passwords.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    5. Enumeration is involved with the scanning step, it entails compiling a list of vulnerabilities and weaknesses of the target.…

    • 292 Words
    • 1 Page
    Satisfactory Essays