Lab 4

Satisfactory Essays
1. What are the five steps of a hacking attack.
Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive os fingerprinting.
It sends commands to the platform-specific nmap executable and pipes the output back. Zenmap uses Profiles which are basically nmap parameter presets to specify how scans are performed.

3. What step in the hacking attack process uses Zenmap GUI?
System Hacking

4. What step in the hacking attack process identifies known vulnerabilities and exploits?
Enumeration

5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability ''MSO8-067"?
MS08-067: Vulnerability in Server service could allow remote code execution.

6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 Workstation?
Microsoft Server Service Relative Path Stack Corruption and Metasploit

7. If you were a member of a security penetration testing team, and you identified vulnerabilities and exploits, should you obtain written permission from the owners prior to compromising and exploiting the known vulnerability?
Yes.

8. What does the tool Ettercap do?
Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols.

9. The most important step in the five-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Lab 4 Part 1: 10 points Assignment: Create an Internet and E-mail Acceptable Use Policy Learning Objectives and Outcomes Research and compare Internet and e-mail use policies enforced by other organizations. Create an Internet OR e-mail use policy for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    Assessment Worksheet 65 Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) Course Name and Number: Student Name: Dennis Dobbins Instructor Name: P Butu Lab Due Date: 10/8/13 Overview In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer (MBSA) and reviewed…

    • 327 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 506 Words
    • 3 Pages

    Lab 4 Tissues Purpose: The purpose of this lab is to disover Histology or the study of tissues. Tissue make up a large part of our bodies and in this lab we will learn about the different types and functions of tissues. Hypothesis: I believe at the end of this lab If I am willing to do the reasearch the I will be able to use a mircoscope to look at different tissue samples and learn about the many types of tissue cells and their functions. Materials: The internet Book:Human Antomony…

    • 506 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 794 Words
    • 4 Pages

    hours:minutes:seconds GMT did the P waves arrive? (See Lab Exercise #1, Step 1, Question 1) A) 01:48:00 B) 01:49:00 C) 01:50:00 D) 01:51:00 2. What time in hours:minutes:seconds GMT did the S waves arrive? (See Lab Exercise #1, Step 1, Question 2) A) 01:51:30 B) 01:52:00 C) 01:53:10 D) 01:54:20 3. What is the time lag (S-P) in hours:minutes:seconds GMT? (See Lab Exercise 1, Step 1, Question 3) A) 00:02:00 B) 00:03:20 C) 00:03:30 D) 00:04:10 4. What is the distance in kilometers between…

    • 794 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    Lab #4 Compromise and Exploit a Vulnerable Microsoft Workstation IT Security: Attack & Defense Course Number: ISSC362 IP address for Windows vulnerable computer: 172.30.0.3 Open Ports on 172.30.0.3: 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds 1025/tcp open msrpc Microsoft Windows RPC 3389/tcp open microsoft-rdp Microsoft Terminal Service 5000/tcp open upnp Microsoft Windows…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 4

    • 575 Words
    • 3 Pages

    LAB 4 1.List four cell structures that were common to both plant and animal cells. (4 points) a.What structures were unique to plant cells? (2 points) b. What structures were unique to animal cells? (2 points) 2.List five structures observed in the cell images and provide the function of each structure. (5 points) a.Structure 1 and function b. Structure 2 and function c.Structure 3 and function d.Structure 4 and function e.Structure 5 and function 3.The student is observing a single-celled…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    NT1210 Chapter 4 Lab 4.1.1 Standards are put in place to make everything work together error free. Because Stability, Consistency, Minimization of packet errors. 4.1.2 Because the voltage used to transmit data needs only be high enough for the receiver to detect it. Making the voltage higher would make the receiver electronics more difficult. 4.1.3 Hospitals, security systems, PA & recording studios. The drawback of STP cables is that they will increase the total cost of an installation.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4

    • 890 Words
    • 4 Pages

    Name and Course Section: Avital Gershtein, Section 701 Title: Aseptic Technique & culturing Microbes - Lab # 4 Purpose: The purpose of this experiment is to Learn and employ aseptic technique, to become familiar with basic requirements of microbial growth, to learn the basic forms of culture media, and to become familiar with methods used to control microbial growth. Bacteria Growth pattern after 24 hours Growth pattern after 48 hours L. acidophilus in liquid MRS broth No growth Amount of sediment…

    • 890 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    Lab #3 - Assessment Worksheet Enabling Windows Active Directory and User Access Controls Course Name and Number: Networking Security Fundamentals Student Name: Instructor Name: Prof. Lab Due Date: Overview In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user accounts and security groups, and applied the new user accounts to the security groups, just as you would in a real world domain. You created nested folders on the remote server and assigned…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    attacks and infections? a. Peru. 3. What does it mean to have a policy of Nondisclosure in an organization? a. It means that certain information can’t be made public under the company’s policy. 4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab? a. Swifi, Interrupdate, Fostrem, Kuaiput, Mibling, Pilleuz, Ergrun, Bredolab, Changeup, Induc 5. What is Phishing? Describe what a typical Phishing attack attempts to accomplish. a. Stealing…

    • 1087 Words
    • 3 Pages
    Powerful Essays