Premium Essay

Networking Hacking- Windows

In:

Submitted By jessiebear932
Words 1967
Pages 8
DCOM 214 Virtual Machine Credentials | Virtual Machine Name | Credentials | Windows Server 2003 Enterprise Edition SQL | Administrator | | P@ssw0rd | BT5R3-GNOME-VM-32 Internal | root | | toor |
NOTE THAT USERNAMES, IP ADDRESSES, AND MATERIALS WILL BE DIFFERENT ON THE TEST
Setting IP Addresses
Windows Server 2003 1. Log in to the Windows 2003 machine with a username of Administrator and a password pof P@ssw0rd.

2. Click on “Start” and select “Run…”. Alternatively, double-click on the Command Prompt shortcut found on the desktop.

3. Type ncpa.cpl and hit Enter.

4. Right-click on “Local Area Connection” and select “Properties”.

5. Double-click on “Internet Protocol (TCP/IP)”.

6. Enter the following address information: IP Address | 192.168.200.200 | Subnet Mask | 255.255.255.0 | Default Gateway | 192.168.200.1 | Primary DNS Server | 192.168.200.200 |

7. Click the “OK” button twice to save the changes.

8. Open a Command Prompt and type the command ipconfig /all. The new IP address information should be displayed.

BackTrack 5r3 Internal 1. Log into the BackTrack 5r3 Internal machine with a username of root and a password of toor. The password will not be displayed as you type.

2. Type the command startx to switch from command line to GUI.

3. Open a terminal by clicking on the icon found in the toolbar at the top of the screen.

4. Type the command ifconfig eth0 192.168.200.50 netmask 255.255.255.0 up to set an IP address and subnet mask.

5. Type the command route add default gw 192.168.200.50 to set a default gateway.

Testing the Network 1. From BackTrack, type the command ping 192.168.200.200 –c 4 to ping the Windows 2003 machine four times.

2. From 2003, type the command ping 192.168.200.50 to ping BackTrack.

3. On BackTrack, type

Similar Documents

Premium Essay

Hacking

...Hacking, a term where someone will be think that it is bad, not good and only think of negativity of that term. This term give several meaning to several people’s understanding and knowledge. First, hacking for computer security, and then hacking for hobbyist and last hacking for programmer subculture. There is the different meaning of hacking based on people understanding but there is also one similarity of all this three meaning, finding out weaknesses in a computer or computer network and exploiting them. The early hacker based on the internet article, wrote by Robert Trigaux, for St. Petersburg Times in 2000, this hacker is in early 1970, John Draper who hack the phone system by blowing a precise tone to ask the system to open the line for long-distance call for free. Nowadays, the internet has become the primary medium to perform business transaction and store the important data. Internet also is a primary medium for hacker to do their job. In a modern ways to make all thing easier, all the of a person can be find in internet nowadays, that make the term privacy is no more important to someone[1]. By using this medium also, a hacker can get an IP of a computer, and can breaking the computer system either to upload or download something from it. In the next paragraph will elaborate more on purpose of hacking, the effect of hacking and the way to prevent hacking. The purposes of hacking that are happen on internet or networking system in entire world today is to steal...

Words: 2065 - Pages: 9

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Premium Essay

Secutiry Threats

...Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly classified into outside and inside threats. Organization may be exposed to viruses and worms as a result of employees not following certain practices or procedures. Intruders are also a big security threat—they hack into large networks to steal private information like social security numbers or credit card account information. Closely related to the intruder security threats are the “Insiders” who are more dangerous in many respects than outside intruders. Insiders have the access and knowledge necessary to cause immediate damage to an organization. Most security is designed to protect against outside intruders and thus lies at the boundary between the organization and the rest of the world (Conklin & White). The various techniques an attacker might employ to access file systems are, Trojan horse programs which are a common way for intruders to trick you (sometimes referred to as "social engineering") into installing "back door" programs. These can allow intruders easy access to your computer without your knowledge, change your...

Words: 452 - Pages: 2

Premium Essay

Sec440 Social Engineering

...both the most effective attack, as well as the most devastating. This paper will detail some of the strategies of identifying and circumventing a social engineering attempt on an organization. I will give real world examples of social engineering attacks and how the attack was able to succeed in easily infiltrating an organization’s IT systems. . Recommendations for Security Measures Dictionary.com defines Social Engineering as “the application of the findings of social science to the solution of actual social problems.” (Dictionary.com, 2011). However in the Information Security world we use this word in a more specific sense. Christopher Hadnagy wrote a great book on this subject called “Social Engineering: The Art of Human Hacking” He defines on his website that Social Engineering is “the act of manipulating a person to accomplish goals that may or may not be in the ‘target’s’ best interest. This may include obtaining information, gaining access, or getting the target to take certain action.” (Hadnagy, 2011). This is the definition of Social Engineering I will be using throughout this paper, and this is perhaps the most dangerous form of attack available to hackers. A Social Engineering attack can be initiated from many different vectors. A phone call could be made by an attacker to extract data. email phishing attacks can be composed to look like a legitimate request for sensitive information, or a physical intrusion into the building by someone claiming false...

Words: 2263 - Pages: 10

Free Essay

Phising and Hacking

...Content 1. Hacking & Phishing 2. What is hacking? 3. How hackers discover your PC’s address? 4. How does a firewall work? 5. What is Phishing? 5.1 Introduction 5.2 Types of Phishing 5.2.1 Clone Phishing 5.2.2 Spear Phishing 5.2.3 Phone Phishing 1. Hacking & Phishing No, we're not talking about baiting the hook while you have a bad cold. Hacking and Phishing are two very different types of computer security threats. Hacking is an extremely y high tech attack which requires you to take certain precautions to protect your computer and al l of the data which is stored in it. Phishing, on the other hand, i s decidedly low tech and just requires a dose of common sense to ward off the dangers. 2. What is hacking? Because the Internet is simply a network of computers that are al l tied together, every one of them (including yours) has the capability to "talk" to any other one. That means that a determined criminal can gain unauthorized zed entry to your PC once he knows your computer's "address". These criminal s are called "hackers". 3. How hackers discover your PC’s address? Your computer l eaves its address al l over the Internet whenever it visits a web site. The addresses can be found in the log files which are automatically generated by every web server among other pl aces. Some hackers use what is known as "port scanning" software which simply goes out on the Internet and el electronically knocks" on the door of every connected computer it can find to see if any will...

Words: 1233 - Pages: 5

Premium Essay

Cyber Security and Its Challenges to Society

...------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years. The act of protecting...

Words: 3707 - Pages: 15

Premium Essay

Test

...Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210...

Words: 2305 - Pages: 10

Free Essay

Hacking Tips

...Hacking Vol. 2 Number 1 Internet for Dummies -- skip this if you are a Unix wizard. But if you read on you’ll get some more kewl hacking instructions. ____________________________________________________________ The six Guides to (mostly) Harmless Hacking of Vol. 1 jumped immediately into how-to hacking tricks. But if you are like me, all those details of probing ports and playing with hypotheses and pinging down hosts gets a little dizzying. So how about catching our breath, standing back and reviewing what the heck it is that we are playing with? Once we get the basics under control, we then can move on to serious hacking. Also, I have been wrestling with my conscience over whether to start giving you step-by-step instructions on how to gain root access to other peoples’ computers. The little angel on my right shoulder whispers, “Gaining root without permission on other people’s computers is not nice. So don’t tell people how to do it.” The little devil on my left shoulder says, “Carolyn, all these hackers think you don’t know nothin’! PROOVE to them you know how to crack!” The little angel says, “If anyone reading Guide to (mostly) Harmless Hacking tries out this trick, you might get in trouble with the law for conspiracy to damage other peoples’ computers.” The little devil says, “But, Carolyn, tell people how to crack into root and they will think you are KEWL!” So here’s the deal. In this and the next few issues of Guide to (mostly) Harmless Hacking I’ll tell...

Words: 13749 - Pages: 55

Free Essay

Ocper

...July 28, 2013 The Benefits of Twisted Pair Cable Computer networking is the basis of the Internet and most all businesses globally. Methods of communication are available to us today which would not be possible without computer networks. Networks increase productivity by allowing computers to and users to simultaneously share data and resources. With a network setup Information is centralized, and repetition of information is avoided because it is shared throughout the network. Networks enable business functions to be completed faster and more precisely. Networks also allow the possibility of expanding as the business grows. Ocper, Inc. currently houses 20 windows peer to peer client computers with the expectation of doubling in size within the next two years. Although a peer to peer network is inexpensive to set-up and allows for file and printer sharing without special software, there are limitations and disadvantages to this setup. In a peer to peer setup, each client is dependent upon the knowledge of each user, and if any user were to shut down at any point, every other user would lose access to any resources that machine shared. The security of the network is less than desirable. Managing all the clients on a peer to peer network can be quite time consuming considering each client would have to be physically visited in order to do maintenance or updates. In order to make the network more secure and also allow for sharing of resources even when a user logs off...

Words: 1090 - Pages: 5

Premium Essay

Botnet

...content to host malicious websites. Bredolab main focus is on downloading Scareware, fake anti-virus programs, and Ransonware. Their plan is to infect many computers with these programs and hope the victims purchase these programs and make some profit. Pushdo/Cutwail is two different botnets that use each other. Pushdo is a loader which means it downloads components to install on a system. It is customized for clients to install specific malware. Pushdo will always download Cutwail (an e-mail spamming engine) and Webail (web-based spamming engine). Pushdo uses Cutwail to create copies of it so the botnet can grow. Those were the big 5 of botnets. How can you break a botnet? Well for starters you can get rid of windows on your computer since botnets are only a windows problem and don’t exist...

Words: 700 - Pages: 3

Premium Essay

Mobile Computing and Social Networking

...own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined. Mobile...

Words: 3603 - Pages: 15

Premium Essay

Nt1330 Unit 3 Assignment 1

...loaded when we install Microsoft Windows Server 2003. Users will not be able to access accounts, unless and until, user authentication activity is completed. This is possible only after a secured connection is established with the server. . SSL/TLS is a type of web application security standard. SSL/TLS talks about addressing two types of threats: (a) Location and (b) Type In “location” threats there are several attacks that can be controlled: i. Server or Client (System Security): The attacks which are concerned with hacking group of servers and clients on the network to discover the confidential information stored in the systems is called server or client attacks. It is a type of system security attack. This deals with hacking a group of systems on the network. Hacking group of servers related to a multi-national bank is a server or client attack. ii. Network Traffic (Web Security): Network traffic talks about generating unnecessary traffic on the network to hamper the security of many web applications present on the network. It is a form of web security attack. This type of attack deals with hacking different types of information flowing on the network. Capturing and tapping the traffic flow from a browser (client) to e-commerce server is a form of web security. The “Type” threats talks about addressing different kinds of attacks on the network. Attacks related to stealing the confidential information passing through the network, hacking the communication between various...

Words: 2324 - Pages: 10

Premium Essay

Ethical Hacking

...Importance of ethical hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical...

Words: 9223 - Pages: 37

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Free Essay

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...N. Justin Bernard Management 6740 Executive Summary “Wireless Networking and How to Keep Yourself Protected” Technology is consistently evolving and changing and wireless networking is no exception. There are constant updates as well as vulnerabilities in wireless networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and...

Words: 3607 - Pages: 15