Solved: Analyze the methods ethical hackers use to perform reconnaissance and social engineering

0 Comments

Instructions

Outcomes addressed in this activity:

Unit Outcomes:

Outline the steps of the information gathering process.

Describe common social engineering techniques.

Describe common information, networking, and physical security attacks.

Use appropriate reconnaissance tools and techniques.

Course Outcome:

IT542-1: Analyze the methods ethical hackers use to perform reconnaissance and social engineering.

Purpose

In the first part of the lab, you will perform reconnaissance from the wide area network. The purpose of this lab is to show you how you can use Nmap to identify open ports and Netcat and telnet for banner grabbing. You will then learn how to use an exploit framework like Metasploit® to get access to the password file and use a password cracking tool like John the Ripper® to crack the password, and then login using admin access. In the second part of the lab you will use Kali Linux to scan a local area network and then use Metasploit and Armitage to exploit vulnerabilities.

Lab Instructions

Part 1:

Complete the labs “Performing Reconnaissance from the WAN” and “Scanning the network on the LAN.” In the lab environment, you will find step-by-step instructions. As you work through the labs, there will be capture-the-flag challenges.

Part 2:

fter completing the labs, answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.

What is the purpose of banner grabbing and how was banner grabbing used in the lab? Identify two tools/methods/commands to perform banner grabbing in addition to Nmap, Zenmap, netcat and telnet, which you used in the lab. Provide a syntax example of one of them.

Identify two popular reconnaissance tools. Compare and contrast your chosen reconnaissance tools and explain the benefits and limitations of each.

Describe two pros and two cons of using the Metasploit framework. Discuss how Meterpreter is used in the post exploitation phase.

When would you use the Nmap scripting engine? Describe a commonly used script and give an example of its use syntax.

Why are there timing and performance options in Nmap? When would you perform a paranoid scan? Give an example of an Nmap paranoid scan.

Identify how you arrived at the conclusion that the firewall is redirecting to both the Windows® and Linux® machines in the lab assuming you are an outsider with no access to lab topology. Provide screenshots from your Nmap scans that show the presence of a windows and Linux machine.

Lab Requirements

Prepare the written portion into a Microsoft Word document. Support any assertions made with credible sources using APA style formatting.

For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.

Also review the university policy on plagiarism. If you have any questions, please contact your professor.

Plagiarism

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

www.lab.infoseclearning.com/course/GQZVVNPJGR/lab/SQFAQLDIBL?check_logged_in=1 

www.lab.infoseclearning.com/course/GQZVVNPJGR/lab/UWUENTBWQA?check_logged_in=1

Or Logged in the school website: www.purdueglobal.brightspace.com/d2l/home

Get Homework Help Now

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Solved: ASSIGNMENT #10

0 Comments

CHAPTER-13 : Discussion Questions 1. Define sales and operations planning.…