Preview

Unit 1 Assignment Q A

Good Essays
Open Document
Open Document
592 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment Q A
IS4560
Lab #1
Assessment Question & Answers
1). List five (5) steps of the Hacking Process.
Footprinting
Scanning and Enumeration
System Hacking
Plant Rootkits and Backdoors
Covering Tracks
Expanding Influence 2). In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?
The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering.
3). What application and tools can be use to perform this initial reconnaissance and probing step?
Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace.
4). How can social engineering be used to gather information or data about the organization’s IT infrastructure?
Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.
5). What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?
Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target.
6). Explain how an attacker will avoid being detected following a successful penetration attack?
To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t.
7). What method does an attacker use to regain access to an already penetrated system?
Any good hacker will always leave some sort of a backdoor into the system. This allows for easy access

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    Sam Spade - Zone Transfer ask a DNS server for all it knows about a domain, SMTP Relay Check whether a mail server allows third party relaying, Scan Addresses scan a range of IP addresses looking for open ports, Crawl website search a website, looking for email addresses, offsite links, etc., Browse web browse the web in a raw http format, Check cancels search your news server for cancel messages, Fast and Slow Traceroute find the route packets take between you and a remote system, S-Lang command issue a scripting command; useful for debugging scripts, Decode URL decipher an obfuscated URL, Parse email headers read email headers and make a guess about the origin of the email…

    • 430 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    9. The most important step in the five-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report is to provide insight on nefarious computer activities called ping sweeps and port scans as a request from management. I will identify them, explain what they are use for, how they are used and how to stop them from attacking a network. Finally I will discuss how they can be eliminated as security risk. The information in this report is designed to increase the understanding and knowledge of these two activities so that this company’s IT department will be in a better position to recognize them and block potential attacks from their use.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    3. What must you obtain before you begin the ethical hacking process or penetration test on a live…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? / They all affect security and integrity of a network domain local.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Social engineering attacks are another concern for our company. People tend to use sites like Facebook in order to communicate with other employees, family, and friends. It is in our best interest to have strict policies constantly in place to validate the uniqueness of the user prior to a password reset being made.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Discuss the role that preparing employees to recognize and respond to social engineering techniques should play in the organization’s overall information security program. Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Safe Guarding 333

    • 2213 Words
    • 8 Pages

    Gather information to determine whether a criminal investigation should take place or immediate action is required.…

    • 2213 Words
    • 8 Pages
    Good Essays
  • Good Essays

    - Hackers are always one step ahead antivirus software, so these software are not 100% safe…

    • 872 Words
    • 3 Pages
    Good Essays

Related Topics