Preview

Lab 1

Satisfactory Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 1
LAB 1: Footprinting a Network
One of the most astounding side-effects of the Internet is how readily accessible information is about individuals, organizations, and computer systems. This assignment is designed to give you some experience in obtaining this information. Materials Needed:  Computer  Internet connection with “Ping” command available Activity


Use “Ping” command to determine the IP address of www.google.com and www.uhv.edu e.g. launch the command prompt and type in “ping www.google.com” you will get the ip address of Google as well as the response time.



Determine who administers these computers and any other information readily available. You may use any websites or tools like ARIN, Neotrace, Whois (http://www.networksolutions.com/en_US/whois/ ), or other open source public information. Describe how you found the information. You now have all kinds of information that would allow you to take advantage of vulnerabilities at that site. Download NetBrute from http://www.rawlogic.com/products.html or from the software uploaded in the folder directly. Whether you are using a residential network or on campus, the network operator does monitor the networks very tightly, so you must be careful using this tool. Students have been locked out of the university network and servers when they used this carelessly. Inspect www.uhv.edu using the PortScan feature of NetBrute. If you are not familiar with the setup, please download and review the demo video first.





Web servers are notorious for containing large numbers of vulnerabilities. Find out which of the hosts in the same subdomain as www.uhv.edu have web servers running. Select a few of these and try and determine what the server is used for. Describe what you found and how you found it.

Questions
1. Discuss the information that you found about www.google.com, www.uhv.edu, as well as other you are interested. 2. Discuss ways that a hacker would be able to exploit this information.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Links to downloadable files and media could be replaced with malicious code and hackers could gain access and monitor activity within the company.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 3

    • 789 Words
    • 4 Pages

    To predict caloric expenditure you can plug in a measured heart rate and calculate the predicted VO2 (L/min). Then using the predicted VO2 and an estimated thermal equivalent (4.825 kcal/LO2), you can estimate the caloric expenditure. Nonetheless, each individual’s heart rate varies. These can be attributed to gender differences, physical activity and physical training. So, if the person is of the same gender and is as healthy as you are and does the same amount of exercise then it could be possible to use their regression line to estimate your own caloric expenditure however the limitations would be possibly the difference in size of the lungs for the estimation of VO2 max. Weight would be important, as it is required to calculate the predicted caloric expenditure. However if your weight can be misleading because one can simply weigh more because they are taller, not because they are bigger. Height does not play such an important role. When you are taller, your body does need to pump more blood throughout the body. This means that they will pump more blood per beat but not that they would have a higher heart rate. It is important to remember that a linear relationship exists between…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Information gathering is a key element when you are trying to find some hidden data about someone, a company, or even a school. In a university, I could determine what the internet protocol address range by going to a web browser and typing in WHOIS in the search engine. Afterwards I would click the WHOIS link and it will take me to a screen with a text search box where I would put in the domain name of the university and hit search. Then I should see the results and it will give me the university’s IP addresses in a range from beginning to end. If I wanted to retrieve data from the Domain Name System, I would log into one of their networks and go to the command line interface and use the nslookup command tool that will allow me to retrieve information from the DNS server saying what is the current server I am currently on and its IP address. In addition I could get more information just by using the nslookup…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Will Use HOLDADECK WEB to test for vulnerabilities in web based applications. Uses a spider to discover Web Page vulnerabilities including buffer overflows, cross site scripting and SQL injections.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Summarize the importance of identifying weaknesses and motivation for attacks early in the development or implementation process.…

    • 258 Words
    • 1 Page
    Satisfactory Essays