Lab #4 Compromise and Exploit a Vulnerable Microsoft Workstation IT Security: Attack & Defense Course Number: ISSC362 IP address for Windows vulnerable computer: 172.30.0.3 Open Ports on 172.30.0.3: 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn 445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds 1025/tcp open msrpc Microsoft Windows RPC 3389/tcp open microsoft-rdp Microsoft Terminal Service 5000/tcp open upnp Microsoft Windows
Premium Microsoft Windows Windows XP Operating system
mean to have a policy of Nondisclosure in an organization? a. It means that certain information can’t be made public under the company’s policy. 4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab? a. Swifi‚ Interrupdate‚ Fostrem‚ Kuaiput‚ Mibling‚ Pilleuz‚ Ergrun‚ Bredolab‚ Changeup‚ Induc 5. What is Phishing? Describe what a typical Phishing attack attempts to accomplish. a. Stealing online account information by posing as a legitimate
Premium Security Internet E-mail
iLab5A /* Specification: lsd Lab 5 Exercise A This program takes input from the user taking player names (up to 100) and player scores (up to 100). When the user enters Q to quit the program a summary is displayed with all the player names‚ player scores‚ the average score‚ then a list of players who scored below the average. */ using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace LAB5 {
Premium Scores The Score The Players
Exercise 5: Gymnosperms and Angiosperms ______________________________________________________________________________ OBJECTIVES: 1. Describe the distinguishing features of gymnosperms and angiosperms. 2. Understand the evolutionary significance of pollen and seeds. 3. Understand the function of a cone‚ a flower‚ and a seed. 4. Relate the life cycle of angiosperms to the other phyla of the plant kingdom. ______________________________________________________________________________ INTRODUCTION
Premium Seed Plant Flower
NT1210 Chapter 4 Lab 4.1.1 Standards are put in place to make everything work together error free. Because Stability‚ Consistency‚ Minimization of packet errors. 4.1.2 Because the voltage used to transmit data needs only be high enough for the receiver to detect it. Making the voltage higher would make the receiver electronics more difficult. 4.1.3 Hospitals‚ security systems‚ PA & recording studios. The drawback of STP cables is that they will increase the total cost of an installation.
Premium Ethernet Twisted pair Coaxial cable
GS104 Lab Report Experiment # 5 Pendulum and the Calculation of g David Case: February 14‚ 2015 Experiment #5 Pendulum and the Calculation of g Objectives: To calculate the acceleration due to gravity by observing the motion of a pendulum. To investigate the effect of varying mass on the period of a pendulum. To investigate the effect of varying the length of a pendulum on the period Materials: stopwatch support for the pendulum
Premium Pendulum Orders of magnitude Periodic table
Lab #5 Questions and Answers 1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol captures. Wireshark does well at both aspects‚ which makes it a little better. 2. What is promiscuous mode and how does this allow tcpdump‚ Wireshark‚ and NetWitness Investigator to perform protocol capture off a live network? Promiscuous
Premium Transmission Control Protocol Wireshark
Abstract The objective of this lab was to determine the convective heat transfer coefficient of a heated sphere in an quiescent environment. In the experiment a hot brass sphere was put into water and cooled. The temperature of the sphere was recorded over a time of 600 seconds to see how it cooled and given temperature was recorded every 20 seconds. Results were then calculated at both of the time values 300 and 600 seconds. For the experimental results at time 300 seconds‚ the Rayleigh number
Premium Convection Heat transfer Heat
Name and Course Section: Avital Gershtein‚ Section 701 Title: Aseptic Technique & culturing Microbes - Lab # 4 Purpose: The purpose of this experiment is to Learn and employ aseptic technique‚ to become familiar with basic requirements of microbial growth‚ to learn the basic forms of culture media‚ and to become familiar with methods used to control microbial growth. Bacteria Growth pattern after 24 hours Growth pattern after 48 hours L. acidophilus in liquid MRS broth No growth Amount of sediment
Premium Bacteria
Lab 5 Assessment Questions 1. What are the three major categories used to provide authentication of an individual? a. Password b. Token c. Shared Secret 2. What is Authorization and how is this concept aligned with Identification and Authentication? Authorization is a set of rights defined for a subject and an object; this concept is aligned with Identification and Authentication because these are the 3 steps to the access control process 3. Provide at least 3 examples of Network Architecture
Premium Certificate authority Authentication Access control