This website uses cookies to ensure you have the best experience. Learn more

Is4560 Lab 1 Assessment Essay

1248 words - 5 pages

Lab 1
Assessment Worksheet
Develop an Attack & Penetration Plan

1. List the 5 steps of the hacking process.
* Reconnaissance
* Scanning
* Gaining Access
* Maintaining Access
* Covering Tracks
2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be reconnaissance. I would use passive reconnaissance as this pertains to information gathering.
3. The reconnaissance phase can have many different faces, and depending on the goal of the attacker, various tools and applications can be used. Nslookup can ...view middle of the document...

Social engineering includes scams such as obtaining passwords by pretending to be an employee, leveraging social media to identify new employees who might be more easily tricked into providing customer information, and basically any other method to attempt to breach security by obtaining trust. The major forms of social engineering are Phishing, Baiting, and Diversion Theft.
5. Enumeration is the first attack on a target network. It is the process to gather information about a target machine by actively connecting to it. It means to identify the user account, system account, and administrative accounts. Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s goal since it reveals the information needed to access the target. It can include a list of usernames, groups, applications, banner settings, and auditing information.
6. In most cases, an; attacker tries to avoid detection, and will do so by covering their tracks by purging information from the system to destroy any evidence of the crime. You must be careful when doing so because sometimes it is not what was covered up or deleted, it is what is not there that can get the hacker busted.
7. If an attacker wants to regain access to an already penetrated system, depending on the goals of the attacker, they may leave behind a backdoor on the system for later use. They can be used to regain access, as well as allow any number of different scenarios to take place, such as privilege escalations or remotely controlling a system.
8. When asked to perform an intrusive penetration test that involves cracking into the organizations WLAN, and you are able to retrieve the authentication key, you should use this and continue your penetration testing. Record your results and report your findings when you are finished. But if you can get the authentication key, what else are you really able to get? You should see how far your penetration test will get you. The more information you can gather, the better off the organization will be when they know how many holes and weaknesses are in their system, and the better they can fix and maintain them.
9. NIST 800-42 encompasses security testing and penetration testing. It includes how network security testing fits into the system development life cycle and the organizational roles and responsibilities related to security testing. It also introduces the aspect of available testing techniques, their strengths and weaknesses, and the recommended frequencies for testing. Finally, it gives strategies for deploying network security testing, including how to prioritize testing activates.
10. There are four phases of penetration testing, according to NIST. They are planning, discovery, attack, and reporting. In the...

Other Papers Like Is4560 Lab 1 Assessment

Monkeys Essay

307 words - 2 pages Lab #2 – Assessment Worksheet Performing a Vulnerability Assessment Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commands within the Zenmap

Blank Essay

258 words - 2 pages © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date

Common Lab Tasks

2403 words - 10 pages in this tab includes the assessment questions for this lab. They are included as a deliverable for every lab. It is recommended that you review these questions prior to performing the hands-on steps. Assessment Figure 3 Lab Navigator 1. In the left pane, click each tab to familiarize yourself with the content of the lab before proceeding with the Hands-on Steps. 2. Click the Intro tab to begin the virtual lab. © 2014 by Jones & Bartlett

Chapter 5

272 words - 2 pages level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level. Lab Assessment Questions & Answers 1. Why would a network administrator use Wireshark and NetWitness Investigator together? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol

Information Systems Security

4584 words - 19 pages Fundamentals of Information Systems Security 1E REVISED 38351_FMxx_ttlcp.indd 1 8/1/12 1:00 PM 38351_FMxx_ttlcp.indd 2 8/1/12 1:00 PM Contents Ethics and Code of Conduct Preface LAB #1 ix vii Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Introduction Deliverables Hands-On Steps 1 1 3 14 15 2 Learning Objectives 1 Evaluation Criteria and Rubrics LAB #1 ASSESSMENT WORKSHEET LAB #2 Perform a

Lab 1 Performing Reconnaissance and Probing

518 words - 3 pages Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Principals of Information Assurance CIS2350 Course Name and Number: _____________________________________________________ Shane Grogan Student Name: ________________________________________________________________ Timothy Pintello Instructor Name: ______________________________________________________________ Unknown Lab Due Date

Applying Owasp to a Web Security Assessment

589 words - 3 pages Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business functions and each security practice of OpenSAMM. 1) Governance 2

Construct A Linux Host Firewall And Monitor For Ip Traffic

665 words - 3 pages running on the Linux desktop. By defining what IP traffic is allowed and what IP traffic is denied, you implemented another layer of security in your overall layered security strategy. In addition, you explored some useful network management and security operation tools, which can be enabled to monitor your IP traffic and security functions. Lab Assessment Questions & Answers 1. Briefly explain how the Gufw internal Ubuntu host IP stateful


379 words - 2 pages desktop services to remotely access the TargetWindows01 server. Finally, you tested the security layers you placed in the previous parts of the lab by using each new user account to access and modify the nested folders on the remote server. Lab Assessment Questions & Answers 1. What are the three fundamental elements of an effective security program for information systems? 2. Of these three fundamental controls, which two are used by the Domain

: Ab #1 Fundamentals of Information Systems Security

661 words - 3 pages Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Fundamentals of Information Security Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the

Assessment 4

600 words - 3 pages : ________________________________________________________________ Overview In this lab, you explored the Open Web Application Security Project (OWASP) Web site and reviewed its Web application test methodology. You studied the standards and guides published by this project and summarized your findings. Finally, you drafted a Web Application Test Plan based on the information you gained in your OWASP research. Lab Assessment Questions & Answers 1. Identify the four recognized business

Related Essays

Lab #1 Assessment Essay

668 words - 3 pages Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have

Is3440 Unit 1 Lab Assessment Sheet

503 words - 3 pages were (or were not) running. Lab Assessment Questions & Answers 1. During the Minimal install, NTP (Network Time Protocol) server was not installed. From a security perspective, why is it important for a system to keep accurate time? To keep the system in sync and up to date for logging purposes such as any incidents that occur. Otherwise a time may not be correct when checking logs for an incident. 2. During the install, you set a

Nt2580 Lab 1 Nt2580 Lab 1 Lab #1 Assessment Worksheet

599 words - 3 pages A network is a group of computers (often called nodes or hosts) that can share information through their interconnections. A network is made up of the following components: Computer systems (nodes or hosts). Network devices that enable connectivity (such as hubs, switches, and routers). The transmission medium provides a path for electrical signals between devices. Network interfaces are devices that send and receive electrical signals

Is4560 Lab9 Essay

730 words - 3 pages IS4560 Lab 9 1. When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why? Inform the IT help desk to have the user cease all activity on the workstation and to wait for you to arrive at the physical desktop location. The workstation must first be physically disconnected from the network leaving it