Premium Essay

Hacking and Countermeasures

In:

Submitted By themaliceone
Words 315
Pages 2
1. What are the five steps of a hacking attack?
Reconnaissance, network and system scanning, gaining access, maintaining access, and covering their tracks

4. What step in the hacking attack process identifies known vulnerabilities and exploits?
The gaining access step is where the attacker identifies and exploits the open vulnerabilities in the network.

5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”?
There were a total of 6 High Risk vulnerabilities found. 1 - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644) (un-credentialed check) 2- MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422) (un-credentialed check) 3 - MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883) (un-credentialed check) 4 - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687) (un-credentialed check) 5 - MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159) (un-credentialed check) 6 – Says it is Nessus Scan information. MS08-067 is vulnerability in Server Service that Could Allow Remote Code Execution.

6. Which tool and application was used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 workstation?
We used Backtrack 4 R2, and we used Metasploit to exploit the identified vulnerability.

7. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, should you obtain written permission from the owner’s prior to compromising and exploiting the known vulnerability?
Yes if you do not attain written permission from the owner then it is

Similar Documents

Free Essay

Hacking Countermeasures & Tech., Lot2-Task1

...21 Nov 2011 Defense Against Denial of Service (DoS) Attacks A. University Network Diagram illustrates nature of DDoS attack in Red Hacking POWER 10 11 Cisco 2517 RS232 NMS IN BAND RESET Speed 1 3 5 7 9 11 Link/Act Speed 13 15 17 19 21 23 Link/Act Speed 25 27 29 31 33 35 Link/Act Speed 37 39 41 43 45 47 In Use Link/Act Link/Act In Use Link/Act Console 47 45 Pwr Status Up RPSU Base Down Speed 2 4 6 8 10 12 Link/Act Speed 14 16 18 20 22 24 Link/Act Speed 26 28 30 32 34 36 Link/Act Speed 38 40 42 44 46 48 Link/Act 46 48 BayStack 5 520-48T-PW R Speed 1 3 5 7 9 11 Link/Act Speed 13 15 17 19 21 23 Link/Act Speed 25 27 29 31 33 35 Link/Act Speed 37 39 41 43 45 47 In Use Link/Act Link/Act In Use Link/Act Console 45 47 Pwr Status Up RPSU Base Down Speed 2 4 6 8 10 12 Link/Act Speed 14 16 18 20 22 24 Link/Act Speed 26 28 30 32 34 36 Link/Act Speed 38 40 42 44 46 48 Link/Act 46 48 BayStack 5 520-48T-PW R 12 1 2 3 4 5 6 7 8 9 Speed 1 3 5 7 9 11 Link/Act Speed ...

Words: 1397 - Pages: 6

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Free Essay

Building an Access Control System

...Assignment 1: Attack Methodology and Countermeasures Terrance Moore Professor Siplin Perimeter Defense 10/31/2013 When you are utilizing security features in an application, consideration should be given to the design, implementation, and deployment. It would helpful if you understand how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords...

Words: 996 - Pages: 4

Premium Essay

Lot2 Task 3

...SUBDOMAIN 426.4 - HACKING   Competencies: 426.4.2: Preattack Planning - The graduate evaluates techniques used in footprinting and implements industry best practices to protect against this type of information asset vulnerability. 426.4.3: System Hacking - The graduate evaluates various network system hacking counter-techniques. 426.4.5: Hacking Web Servers - The graduate identifies known web server vulnerabilities and demonstrates industry best practices to protect against this type of threat. 426.4.6: Web Application Vulnerabilities - The graduate identifies common web application vulnerabilities and uses industry best practices to protect against this type of threat.   Introduction:   Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers. Some organizations do this using internal staff; however, it is much more common to see organizations hire external security consultants to perform these types of security reviews. This allows a truly unbiased outsider to attempt to gather as much information as possible to formulate an attack.   Assume that you have been selected as the security consultant to perform a comprehensive security review for an organization of your choosing. Ensure that the organization that you select has a public website that you can access and at least one web application that you can use for this task. You will review the security...

Words: 1868 - Pages: 8

Premium Essay

Lab #4 – Assessment Worksheet

...Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses Zenmap? Reconnaissance 4. What step in the hacking attack...

Words: 285 - Pages: 2

Premium Essay

Course Outline

...the many different information security and assurance frameworks (ISO 27001/2, COBIT, ITL, etc.). The results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content. The Security Policy and Standards subdomain focuses on creating organizational security activities and policies; assessing information security risk; and implementing and auditing information security management programs, information assurance certification programs, and security ethics. Watch the following video for an introduction to this course: Competencies This course provides guidance to help you demonstrate the following 3 competencies: Competency 427.3.2: Controls and Countermeasures The graduate evaluates security threats and identifies and applies security controls based on analyses and industry standards and best practices. Competency 427.3.3: Security Audits The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices. Competency 427.3.4: Certifications and Accreditations The graduate identifies and discusses the Information Assurance certification and accreditation (C&A) process. Course Mentor Assistance As you prepare to successfully demonstrate competency in this subject, remember that course mentors stand ready to help you reach your educational goals. As subject matter experts, mentors enjoy and take pride in helping...

Words: 4354 - Pages: 18

Premium Essay

It-255

...reserved. Page 2 Key Concepts  Role of an audit in effective security baselining and gap analysis  Importance of monitoring systems throughout the IT infrastructure  Penetration testing and ethical hacking to help mitigate gaps  Security logs for normal and abnormal traffic patterns and digital signatures  Security countermeasures through auditing, testing, and monitoring test results IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 4 Purpose of an IT Security Assessment Check effectiveness of security measures. Verify access controls. Validate established mechanisms. IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 5 IT Security Audit Terminology  Verification  Validation  Testing  Evaluation IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 6 Purpose of an IT Infrastructure Audit Verify that established controls perform as planned. Internal audits examine local security risks and countermeasures. External audits explore attacks from outside. IT255 Introduction to Information Systems Security © ITT Educational Services, Inc. All rights reserved. Page 7 IT Security Assessment vs. Audit Security...

Words: 799 - Pages: 4

Premium Essay

Ethical Hacking

...26, 2014 Ethical Hacking Ethical hacking is used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker works passed the system security to detect the vulnerabilities or weak points of a company’s network. Then this type of information is used to improve the company’s network from the bad hackers who exploit the company in a destructive way. In 1960s, U.S military began testing their own IT systems, but when Dan Farmer a security expert from San Francisco and a security programmer at the Netherlands University of Eindhoven had posted the techniques they used to gather information to the Usenet, that could have compromised the security of a number of target networks(Langely). Their goal was to raise the overall level of security on the internet. Dan farmer and Eindhoven were elected to share their work freely on the internet for others to learn. Eventually, they gather up the work they used and developed a program called Security Analysis Tool for Auditing Networks (Langely). This tool is used to perform an audit of the vulnerabilities of the system and how to eliminate the problem. The concept of ethical hacking started emerging in 1993 (Langely). According to some, ethical hacking does not exist and they feel hacking is just hacking, no matter how you put it. Therefore the one that is doing the hacking is a computer criminal. This is not the case, so in order for hacking it to be “ethical...

Words: 589 - Pages: 3

Premium Essay

Is4560 Unit 1

...Hacking and Countermeasures IS4560 Unit 1 Assignment 1 July 26 2016 Hacking and Countermeasure Here are some of the top threats described in the whitepaper and why the threats are important issues and how these threats have changed or are changing. The main issues that I found were Web browser vulnerabilities and SQL-injection attacks. These types of threats are found often and hackers exploit them all the time. One of the most known browsers to get exploited is internet explorer. “In the case of the Hydraq attack, a previously unknown vulnerability in Microsoft® Internet Explorer® and a patched vulnerability in Adobe® Reader® and Adobe Flash® Player are exploited to install the Trojan.10 Once the Trojan is installed, it lets attackers perform various actions on the compromised system including giving them full remote access. Microsoft has had to release patches for Internet explorer. Attacks can originate from malicious websites as well as legitimate websites that have been compromised. So in the end it doesn't really matter which web browser you are using the end result will be the same if their vulnerabilities are not updated. According to statistics from 2014, there was an increase in the market share of Chrome, Firefox, and Safari at the expense of Internet Explorer over the course of the year. The second most widely exploited attack was the downloading of a suspicious PDF, this was really affecting those who...

Words: 500 - Pages: 2

Free Essay

Unit 2 Discussion 1

...the ones I deal with currently are work station, user domain and remote access. In any environment that you work with any of these 7 domains countermeasures are needed. It’s very important to make sure your network is secure and there are quite a few actions to take to ensure that it is safe as possible. Although no domains are 100% secured it’s always good to make sure all updates and patches are up to the most recent. I will also name a few other ways to protect certain domains in a typical IT infrastructure. Some countermeasures to take for user domain are making sure to have all users aware of security. Also have restricted access for a company’s terminal server and observe abnormal employee activity. Anti-virus is also needed to make sure the computers servers aren’t infected with malicious programs that cause loss in important documents. With a work station you can add a firewall to prevent unwanted traffic from infiltrating the network. Ensuring that your workstation has the latest service packs and patches update will also help protect any holes that could lead to hacking. Also with remote access it’s good to make sure only that person has access to certain files and must keep their password secure and not make a weak password so it does not get compromised. All these countermeasures serve as security and deterrents for any possible ways threats by people or viruses can cause damage to your typical IT...

Words: 267 - Pages: 2

Free Essay

Attack Methodology and Countermeasures

...Attack Methodology and Countermeasures Strayer University SEC420 Professor Gillen July 24, 2015 Attack Methodology and Countermeasures When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones, who are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Consider this: company XYZ, a mid-sized corporation, is in the middle of satisfying their regulatory compliance needs.  The manager of security at the company has been tasked by the CIO (Chief Information Officer) to report on the company’s current security posture. If the manager decided to outsource an ethical or white hat hacker in attempt to test their security measures. Over the course of this document various things the third party hacker would need from the company, things he or she would provide to the company and some predictions for the tests. In order to exploit the targeted systems the initial steps to gain as much information as possible about the targets. In this case, the manager is the contact in which questions may be posed. The hacker would...

Words: 1432 - Pages: 6

Free Essay

Ceh Course

...attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Duration 5 days (9:00 – 5:00) Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification. Page 2 EC-Council Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these...

Words: 458 - Pages: 2

Premium Essay

Assignment 2: Identifying Potential Risk, Response, and Recovery

...configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk. As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access control and network protection, but also to understand application behavior to protect against attacks and hazards. Hackers’ always targeting applications and their goal is to...

Words: 1056 - Pages: 5

Premium Essay

Identifying Potential Malicious Attacks

...configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software.   Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk.  As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access control and network protection, but also to understand application behavior to protect against attacks and hazards.   Hackers’ always targeting applications and their goal is to...

Words: 1060 - Pages: 5

Free Essay

Lab1

...LAB 1 Tuesday Hacking and Countermeasures Reconnaissance, scanning, Gaining Access, Maintaining Access, Covering Tracks I would follow the fives steps of hacking and start with step number one, reconnaissance, and a bit of scanning. I believe google would be a great tool for performing the first step in hacking, there is a lot of information on most things there. Other tool sthat could be used are NMap, Paratrace, and ScanRand. Social engineering is one of the best ways to get information abotu a company or person. In social engineering one could pretend to be a higher up just trying to run a check and get all sorts of information. One of the most common forms of social engineereing is a method called phishing. Enumeration is similiar to scanning a system for vulnerabilitiesthat can be used to attack the system. This is vital to a hackers object since it reveals the information needed to access the target. To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t. An attacker will leave some sort of backdoor into the system. This allows for re-entry at a later time that doesnt appear in scans by the company As the security professional your job is to find holes in the...

Words: 442 - Pages: 2