Lab #4 – Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking:
Words: 285 - Pages: 2
“Matthew Kreglo” + Holly Stark To correct this vulnerability, it looks like you mainly have to shut off “Autoplay”. There are more intrusive ways on how to do this at the Microsoft site: http://support.microsoft.com/kb/962007 Lab #4 Assessment Worksheet Compromise and Exploit a Vulnerable Microsoft Workstation/Server Overview During this Lab the student will learn the running of a port scan using Zenmap GUI for the discovery of running systems and services as well as open ports listening
Words: 574 - Pages: 3
Private Investigators Limited Liability Company (LLC) has a small office with one server and six workstations. This LLC partnership hosts its own website that allows clients to log in and enter case information. An evaluation of the network and security configuration to determine threats and weakness to the existing system has been completed. A list of the top five associated threats for the Server, Workstations, and Website are outlined below. The following memo discusses the likelihood of the threats
Words: 2179 - Pages: 9
Develop an attack plan to compromise and exploit a web site using cross-site scripting (XSS) against sample vulnerable web applications * Conduct a manual Cross-site Scripting (XSS) attack against sample vulnerable web applications * Perform SQL injection attacks against sample vulnerable web applications with e-commerce data entry fields * Mitigate known web application and web server vulnerabilities with security countermeasures to eliminate risk from compromise and exploitation Overview
Words: 1054 - Pages: 5
computer and user. With all the responsibility an OS is bound to have weaknesses. Typically, security vulnerabilities are usually rooted from glitches/bugs in the scripts that run beneath the OS. The most commonly used OS are Unix, Mac OS, and Microsoft Windows. With Windows being the leading OS, security patches have to be downloaded constantly. With out identifying a specific OS, there are advantages and disadvantages that can be implemented to protect the OS. Advantages of Securing OS Mitigating
Words: 2482 - Pages: 10
A. Outline the top five threats to each of the following in the given scenario: 1. The server 2. The workstations 3. The website Threats - Server Rootkits – This software, which is malicious in nature, allows hackers to gain and maintain elevated or administrative access to servers. Often times, this type of software come as an attachment shared among e-mail contacts, and is accidently initiated when saved to a local folder. The software can then hold open a gateway to allow the attacker
Words: 2778 - Pages: 12
Pa R T O N e Risk Management Business Challenges Risk Management Fundamentals 2 Managing Risk: Threats, Vulnerabilities, and Exploits 29 Managing Compliance 57 Developing a Risk Management Plan 85 CHaPTeR Risk Management Fundamentals 1 R ISK MANAGEMENT IS IMPORTANT to the success of every company— a company that takes no risks doesn’t thrive. On the other hand, a company that ignores risk can fail when a single threat is exploited. Nowadays, nformation technology (IT) systems contribute to the success
Words: 10618 - Pages: 43
Chapter 2. Security in the Microsoft Windows Operating System ONE OF THE MORE DIFFICULT TASKS when securing any computer system or network is identifying where to start. There are many components in any computing environment. Each component is a potential point of attack. Since the operating system provides the ability for software and hardware to interact it is a good starting point for securing an entire environment. On any computer, the operating system enables software to access physical resources
Words: 6274 - Pages: 26
Research & Ideas Strategy for Small Fish Published: | August 23, 2004 | Authors: | Marco Iansiti and Roy Levien | * E-Mail * Print * Executive Summary: Microsoft, Wal-Mart, and eBay provide ecosystems in which other companies thrive or fail. But what are effective strategies for a small fish in a big pond? An excerpt from The Keystone Advantage by HBS professor Marco Iansiti and Roy Levien. About Faculty in this Article: Marco Iansiti is the David Sarnoff Professor of
Words: 2237 - Pages: 9
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Network Security Concepts and Essentials: A University Overview How many computers would a university have? Estimate the number of users? A very large number is the answer, probably in the 10's of thousands and possibly higher. Do all these users authenticate with appropriate encryption
Words: 6840 - Pages: 28