Preview

week2 lab#4

Satisfactory Essays
Open Document
Open Document
258 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
week2 lab#4
Week 2 Lab #4 Assessment
ISSC362: IT Security: Attack & Defense
20 december 2013
Lab #4 – Assessment Worksheet

1. Phase 1—Reconnaissance, Phase 2—Scanning, Phase 3—Gaining Access, Phase 4—Maintaining Access, Phase 5—Covering Tracks
2. Zenmap does an intense scan of all TCP ports in order to find open and vulnerable ports.
3. Phase 1 Reconnaissance
4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline security analyzer.
5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS (326830), MS08-067 is a security vulnerability that allows an attacker to take advantage of an exploit that allows a computer worm to remotely run code without user intervention. (Zero day exploit). The patch titled kb958644 fixes the vulnerability.
6. BackTrack4 Metasploit Framework
7. Yes, before penetrating a system, you would always want to get permission from the owners.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Week 6 Lab Report

    • 426 Words
    • 2 Pages

    Judging from the changes that are evident in these two before-and-after illustrations, do you suppose that the geologic age of calcitic marble could be determined from its fossil content (as can be done…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 1 Lab_ CIS_115

    • 439 Words
    • 2 Pages

    TCO 1: Given a simple problem, design and desk-check a solution that is expressed in terms of pseudocode, flowchart, and/or input-process-output (IPO) diagrams.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 20 lab

    • 284 Words
    • 2 Pages

    9. Give a simple way of reading your email that does not involve the use of an MUA.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 7 Lab Exercise

    • 356 Words
    • 4 Pages

    Both sutures and gomphoses are classified as synathroses because they are boh immovably fixed joints between bones…

    • 356 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As a security professional, you have been asked to perform an intrusive penetration test which involves cracking into the organization’s WLAN for a company. While performing this task, you are able to retrieve the authentication key. Should you use this and continue testing, or stop here and report your findings to the client.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerabilities and exploits are identified by enumeration, which is the most aggressive of the scanning stage.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A port scan attack is a popular reconnaissance technique that attackers use to discover services they can break into according to Yahoo Answers (2007), Author unknown. Yahoo Answers states that “All…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The implementation of security scanners and profilers such as Microsoft’s Baseline Security Analyzer (MBSA) are an important component of maintaining an up-to-date and secure Windows infrastructure.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lesson 1 Lab

    • 1279 Words
    • 5 Pages

    1. (10 points) Write out your pre-lab prediction, including what evidence or previous knowledge you have to support that prediction.…

    • 1279 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Week Three Lab

    • 726 Words
    • 3 Pages

    Explain how the ecosystem was affected by the missing species for each round of the demonstration.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ping Sweeps

    • 685 Words
    • 3 Pages

    Port scanning is one of the most popular techniques attackers use to discover services they can break into. All machines connected to a Local Area Network or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. Typical ports scans can show up in system logs. A…

    • 685 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Xmandroid

    • 14924 Words
    • 60 Pages

    Google Android has become a popular mobile operating system which is increasingly deployed by mobile device manufactures for various platforms. Recent attacks show that Android’s permission framework is vulnerable to applicationlevel privilege escalation attacks, i.e., an application may indirectly gain privileges to perform unauthorized actions. The existing proposals for security extensions to Android’s middleware (e.g., Kirin, Saint, TaintDroid, or QUIRE) cannot fully and adequately mitigate these attacks or detect Trojans such as Soundcomber that exploit covert channels in the Android system. In this paper we present the design and implementation of XManDroid (eXtended Monitoring on Android), a security framework that extends the monitoring mechanism of Android to detect and prevent application-level privilege escalation attacks at runtime based on a systemcentric system policy. Our implementation dynamically analyzes applications’ transitive permission usage while inducing a minimal performance overhead unnoticeable for the user. Depending on system policy…

    • 14924 Words
    • 60 Pages
    Better Essays
  • Good Essays

    Honeypots

    • 1901 Words
    • 8 Pages

    In order to monitor the activities of hackers, the methodology adopted is to deceive, by giving them some emulated set of services on a system which appears to be legitimate. The hackers’ activities are then logged and monitored to gain insight into their employed tactics. This idea is adopted in Honeypots, a system whose value lies in being probed, attacked and compromised.…

    • 1901 Words
    • 8 Pages
    Good Essays