Free Essay

Week 2 Lab #4 Assessment

In:

Submitted By pinkmist
Words 343
Pages 2
ISSC362: IT Security: Attack & Defense
14 Apr 2013
Lab #4 – Assessment Worksheet

1. Phase 1—Reconnaissance, Phase 2—Scanning, Phase 3—Gaining Access, Phase 4—Maintaining Access, Phase 5—Covering Tracks
2. Zenmap does an intense scan of all TCP ports in order to find open and vulnerable ports.
3. Phase 1 Reconnaissance
4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline security analyzer.
5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS (326830), MS08-067 is a security vulnerability that allows an attacker to take advantage of an exploit that allows a computer worm to remotely run code without user intervention. (Zero day exploit). The patch titled kb958644 fixes the vulnerability.
6. BackTrack4 Metasploit Framework
7. Yes, before penetrating a system, you would always want to get permission from the owners.
8. Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
9. Microsoft Security Bulletin MS08-067
10. WindowsXP-KB958644-x86-ENU.exe

Similar Documents

Premium Essay

Module 3 Essay

...SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer networking from an historical perspective...

Words: 4795 - Pages: 20

Premium Essay

Health Assessment Family

...COLLABORATIVE BACHELOR OF SCIENCE IN NURSING PROGRAM (University of Windsor, Lambton College, St. Clair College – Windsor & Thames) Health Assessment NRS 63-166 Fall 2011 Site: St Clair College, Thames Campus Teaching Faculty Linda O’Halloran Phone: 519-354-9714 Ext. 3233 E-mail: lohalloran@stclaircollege.ca Office Hours: Monday’s 1100 – 1200, Tuesday’s 1000 - 1600 or by appointment Course Location Room 118 Course Times: Monday’s 1200 – 1400 – lecture Labs: weekly- either Monday or Tuesday as per your schedule Lab Teaching Instructor Maureen Eyres Andrea Reddam Vanessa Schinkel ©Collaborative BScN Program 2010 ALL RIGHTS RESERVED INTRODUCTION TO COLLABORATIVE BScN PROGRAM Mission Statement As partners, the Faculty of Nursing at the University of Windsor with St. Clair College (Windsor and Thames Campuses) and Lambton College (Sarnia) undertake the shared commitment to excellence in the preparation of Bachelor of Science in Nursing (BScN) candidates who embody our core values and the best elements of the art and science of nursing, education, leadership, research, and practice in their professional journeys. Vision EXCELLENCE in nursing education, practice, and research. Core Values ...

Words: 4870 - Pages: 20

Free Essay

Is4670 Week 3 Lab

...Week 3 Laboratory Week 3 Lab Part 1: Automate Digital Evidence Discovery Using Paraben’s P2 Commander Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Open an existing case file using P2 Commander * Analyze the data in the image and the files saved in the case * Sort and identify evidence file types in a case using Paraben's P2 Commander forensic tool * Use P2 Commander to identify information for potential evidence contained in chat logs such as Skype chat * Analyze the contents of user profiles and data using the P2 Commander browser Week 3 Lab Part 1 - Assessment Worksheet Overview View the Demo Lab available in the Practice section of Learning Space Unit 5 and then answer the questions below. The video will demonstrate the use of Paraben's P2 Commander and outline the different forensics capabilities of the tool. Lab Assessment Questions & Answers 1. When talking about Information Security, what does the 'CIA' stands for? CIA in information security stands for confidentiality, integrity and availability. 2. When would it be a good practice to classify data? It would be a good practice to classify data when you need to extract files from a hard drive or system for investigating in order to accurately organize the findings. 3. What is Security classification? Security classification is the security level assigned to a government document, file...

Words: 635 - Pages: 3

Premium Essay

It Project Management

...Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609, (e.gray@gcu.ac.uk) Programmes Taking This Module This module’s host programmes are: • P01627 BSc/BSc (Hons) Computing (Information Systems Development) • P00249 BSc /BSc (Hons) Computing (Web Systems Development) • P00280 BSc /BSc (Hons) Information Technology Management for Business (ITMB) • P01628 BSc (Hons) Computer...

Words: 3307 - Pages: 14

Free Essay

114 Outline

...ISIT114 SISAT School of Information Systems and Technology Faculty of Engineering & Information Sciences Head of School Associate Professor Rajeev Sharma, Student Resource Centre, Tel: (02) 4221 3491 ISIT114 Object Oriented Programming Subject Outline Spring Session 2014 Consultation Times: Subject Coordinator Telephone Number: Email: Location: Dr. Sifer's consultation times during session: Day Monday Wednesday Subject Organisation: Session: Credit Points Contact hours per week: Lecture Times & Location: Tutorial Day, Time and Location can be found at: Spring Session, Wollongong Campus 6 credit points 2 Hours Lec, 2 Hours Lab Wed 10:30-12:30 67-104 http://www.uow.edu.au/student/timetables/index.html Time 9:00 - 11:00am 1:30 - 3:30pm Dr Mark Sifer 4221 4919 msifer @uow.edu.au 39.219 Students should check the subject's web site regularly as important information, including details of unavoidable changes in assessment requirements will be posted from time to time via MOODLE http://www.uow.edu.au/student/ . Any information posted to the web site is deemed to have been notified to all students. Subject Description: The aims of this subject are to consolidate and extend student's knowledge and skills in structured programming and to introduce them to the concepts and practice of object oriented programming. To achieve this aim the subject will provide students with an opportunity to develop further programming skills and good coding style; develop skills in using the object-oriented...

Words: 2995 - Pages: 12

Premium Essay

Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes

...Week 1 Lab Part 1: Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: 1. Configure user accounts and access controls in a Windows Server according to role-based access implementation 2. Configure user account credentials as defined policy, and access right permissions for each user 3. Create and administer Group Policy Objects for the management of Windows Active Directory Domain machines within the IT infrastructure 4. Apply the correct Group Policy Object definitions per requirements defined by policies and access right permissions for users 5. Assign and manage access privileges as requested in the case study to apply the recommended and required security controls for the user accounts Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what...

Words: 1428 - Pages: 6

Free Essay

Is404 Week 1 Lab

...Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong 2. Why would you add permissions to a group instead of the individual? It is more resourceful and less time consuming. 3. List at least 3 different types of access control permissions available in Windows. Full Control, Modify, Execute, Read, Write 4. What are the least permissions that you need in order to view the contents of a folder? Read, so the user has access to any file on the system that they are entitled to, but they are not able to make any changes. 5. What are other available Password Policy options that could be enforce to improve security? ...

Words: 1093 - Pages: 5

Premium Essay

Psych Paper

...Thursday 3:00 pm – 4:50 pm Instructor: Nicholas Von Glahn, Ph.D Office: 5-237 Office Hours: Monday and Wednesday: 11:30 am to 12:00 pm and 3:15 pm to 3:45 pm. Tuesday and Thursday: 1:15 pm to 2:45 pm  Phone: (909) 869-4870 (you can leave a message, but e-mail is much faster) E-mail: nrvonglahn@csupomona.edu (best way to contact me) Web: https://blackboard.csupomona.edu/ Course Description: This course is designed to introduce students to the processes humans obtain, maintain, and use information. This course will primary cover cognitive psychology and focus on the information processing theory—the dominant theoretical perspective in the field. Thus, the behaviors humans engage in as they find information in the environment, retain information, retrieve information from memory, process information to meet the demands of the environment, and communicate information will be focused upon. To this end, the following aspects of cognition will be covered: perception, attention, memory, learning, problem solving, reasoning, decision making, language and individual differences in cognition. Text Book: Reisberg, D. (2010). Cognition: Exploring the science of the mind (5th ed.). New York, NY: W.W. Norton & Company, Inc. Bundled with Zaps: The Norton Psychology Labs You will need Zaps lab, which will have to be purchased separately if you buy a used book. Learning Assessments: Assessment Weight ...

Words: 1297 - Pages: 6

Premium Essay

Dfhdfh

... |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A | |Blackboard Web Site |HTTP://toro.csudh.edu...

Words: 1433 - Pages: 6

Premium Essay

Diploma

...Hours : 4 Class Contact : 5 Hours (3 Hours Lecture + 2 Hour Tutorial/Practical) Independent Self-Learning : 160 Hours Prerequisite : Not Available Consultation Hours : Every Wednesday (02:00pm-5:00pm) (Subject to pre-arrangement only) COURSE OBJECTIVE This course is a comprehensive introduction to the realm of Principles of Information Technology. This is an introductory module to the current and evolving technologies in today’s computer systems. It introduces information technology concepts and principles. This module explains major components of information systems and demonstrates applications of information systems in business. Students are provided with sophisticated knowledge and necessary skills of information technology. Principles of Information Technology is a course that will provide students with computer skills necessary to be successful in “real world” personal and business situations. Students will use Microsoft Office to learn word processing, desktop publishing, presentation software, spreadsheets, and databases. COURSE OUTCOMES On completion of the course, students will be able to: 1. Demonstrate an understanding of basic information technology concepts and principles 2. Describe major components of information systems 3. Discuss business applications of information systems 4. Use Office application software and apply the computer skills effectively METHODS OF TEACHING Lectures and tutorials/lab practices ...

Words: 1347 - Pages: 6

Premium Essay

Business Finance

...School of Management, Operations and Marketing COMM331: Integrative Business Capstone Subject Outline 6 credit points Subject Information Autumn, 2016 Wollongong On Campus Lecture Information: Mondays, 08:00 - 08:00, All COMM331 lectures are online via Moodle Pre-requisites: 96 Credit Points including all Faculty of Business undergraduate 1st year core subjects Co-requisites: Nil Restrictions: COMM333 Contact Hours: Online lectures plus 1 hour of tutorial (up to week 6) and 2 hours of computer lab (from week 7 up to week 13) Online Subject Material: The lecture material for COMM331 is all online. Students can access online materials via Moodle. COMM331 is supported by a UOW Libguide available at http://uow.libguides.com/index Teaching Staff Teaching Role Name Coordinator, Lecturer and Dr Belinda Gibbons Tutor Telephone Email 42215824 bgibbons@uow.edu.au Room Consultation Times 40.247 Wednesday 10:30 - 12:30 Thursday 13:30 - 15:30 Head Tutor Ms Natalie Akmacic NA akmacic@uow.edu.au NA TBA Tutor Ms Jinqi Xu NA vivenx@uow.edu.au NA TBA Tutor Mr Viktor Tomeski NA viktor@uow.edu.au NA TBA Tutor Ms Lynda Lorkovic NA lbricevs@uow.edu.au NA TBA Tutor Ms Nadeera Ranabahu Mudiyanselage NA nadeera@uow.edu.au NA COMM331 Subject Outline Autumn, 2016 TBA Page 1 of 21 Email Etiquette: Consultation with your subject coordinator and/or teachers via ...

Words: 6498 - Pages: 26

Premium Essay

Security Policies and Implementation Week Four Lab

...------------------------------------------------- Sara ------------------------------------------------- 10/11/2014 ------------------------------------------------- Week 4 Laboratory: Part 1 Part 1: Identify Necessary Policies for Business Continuity - BIA & Recovery Time Objectives Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the major elements of a Business Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time...

Words: 1852 - Pages: 8

Premium Essay

Sss Bn Nwteotk

...UNIT DESCRIPTION Bachelor of Networking (BNet) Bachelor of Engineering Technology (Telecommunications) BEng(Tel) BN106-Networking Fundamentals Trimester 1, 2016 1. ENTRY REQUIREMENTS AND SUBJECT WEIGHTING Prerequisites: N/A Co-requisites: BN103 Platform Technologies Credit Points: 15 credit points Level: Year 1, Core Workload: Timetabled hours/week: 4 (Lecture = 2 hours, Tute/Lab = 2 hours) Personal study hours/week: 5 2. STAFF Moderator: Unit Coordinator: Lecturer (Melb): Lecturer (Syd): 3. BRIEF DESCRIPTION This is a second trimester core unit out of a total of 24 units in the Bachelor of Networking (BNet) and Bachelor of Engineering Technology (Telecommunications) BEngTech(Tel). This unit addresses the BNet and BEngTech(Tel) course learning outcomes and complements other courses in a related field by developing students’ knowledge and skills in networks. For further course information refer to: http://www.mit.edu.au/courses/bachelor-networking and http://www.mit.edu.au/courses/bachelor-engineering-technology-telecommunications Computer Networks are built with a combination of computer hardware and computer software. Networks can be categorized in different ways such as according to the geographic area (LAN, WAN, MAN etc) or based on topology or on the types of protocols they support. This unit covers design, networking equipments, protocols and technologies essential to build computer networks. You will also learn principles, benefits...

Words: 2135 - Pages: 9

Premium Essay

Nt2147

...Physical Networking: Syllabus NT1310 NT1310 Physical Networking SYLLABUS Credit hours: 4.5 Contact /Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite(s):NT1210 Introduction to Networking or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 03/02/2012 NT1310 Physical Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installations, testing and troubleshooting techniques for a computer network. MAJOR INSTRUCTIONAL AREAS 1. 2. 3. 4. 5. 6. 7. 8. 9. Telecommunications Cabling Specifications and Constraints Cabling Tools and Media Network Equipment for Wired and Wireless Networks Cable Testing Fiber Optics and Light Principles Fiber-Optic Cables, Splicing and Connectors Fiber-Optic Light Sources, Detectors and Receivers Fiber-Optic Considerations and Testing COURSE OBJECTIVES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. Distinguish between bandwidth, frequency, and data rate in a data network Explain the importance of codes, standards, and specifications. Compare and contrast network topologies ...

Words: 1770 - Pages: 8

Premium Essay

Chamberland

...Session I Session II S E ME S T E R 1 BIOS-251*: Anatomy & Physiology I with Lab MATH-114*: Algebra for College Students NR-101: Transitions in Nursing (T=1) BIOS-252*: Anatomy & Physiology II with Lab SOCS-185*: Culture & Society or SOCS-325*: Environmental Sociology ENGL-117*: English Composition SEMESTER 2 Credits 2 4 1 2 3 3 BIOS-255*: Anatomy & Physiology III with Lab ENGL-147*: Advanced English Composition PSYC-110*: Psychology BIOS-256*: Anatomy & Physiology IV with Lab SPCH-275*: Public Speaking or SPCH-277*: Interpersonal Communication PSYC-285*: Developmental Psychology or PSYC-290* †: Lifespan Development SEM ESTER 3 Credits 2 3 3 2 3 BIOS-242*: Fundamentals of Microbiology with Lab PHIL-447*: Logic & Critical Thinking Credits 3 4 4 3 3 Semester Hours: 16 Credits (LAS=16, NR=0) Semester Hours: 15 Credits (LAS=14, NR=1) NR-222: Health & Wellness (T=3) CHEM-120*:  ntro to General, Organic & I Biological Chemistry with Lab Semester Hours: 14 Credits (LAS=11, NR=3) Total Credit Hours: 45 YEAR 2 Session I Session II S E ME S T E R 1 NR-224: Fundamentals – Skills (T=2, L=1) NR-302: Health Assessment I (T=1.5, L=0.5) NR-281: Pathophysiology I (T=2) NR-226: Fundamentals – Patient Care (T=2, C=1) NR-304: Health Assessment II (T=1.5, L= 0.5) NR-282: Pathophysiology II (T=1) SEMESTER 2 Credits 3 2 2 3 2 1 Semester Hours: 13 Credits (LAS=0, NR=13) SEM ESTER 3 NR-324: Adult...

Words: 720 - Pages: 3