Lab 1. What Are the Five Steps of a Hacking Attack?

In: Computers and Technology

Submitted By dmabey
Words 347
Pages 2
Lab 1. What Are the Five Steps of a Hacking Attack?
1 1. List the 5 steps of the hacking process.
1—Reconnaissance
2—Scanning
3—Gaining Access
4—Maintaining Access
5—Covering Tracks

2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan?
The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step?
Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure?
Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.

5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?
Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target.

6. Explain how an attacker will avoid being detected following a successful penetration attack?
To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t.

7. What method does an attacker use to regain access to an already penetrated…...

Similar Documents

Lab 1. What Are the Five Steps of a Hacking Attack?

...1 1. List the 5 steps of the hacking process. 1—Reconnaissance 2—Scanning 3—Gaining Access 4—Maintaining Access 5—Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an intial first step to collect as much information as possible about the targets prior to devising and attack and penetration test plan? The first step I would take would be from the 5 steps to hacking which is the reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. What applications and tools can be used to preform this initial reconnaissance and probinig step? Google is a major tool in most hackers initial first step. But you can use Nmap , AMAP, ScanRand and Paratrace. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is the same as scanning a system for vulnerabilities that can be used to attack the system itself. This is vital to any hacker’s object since it reveals the information needed to access the target. 6. Explain how an attacker will avoid being detected following a successful penetration attack? To avoid detection a good hacker will...

Words: 752 - Pages: 4

Lab 1

...Assessment Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default......

Words: 489 - Pages: 2

Lab#1 Assesment Hands-on Steps

...follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will plan an attack on 172.30.0.0/24 where the VM server farm resides, and use the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. LAB 1 Learning Objectives Upon completing this lab, you will be able to: • Access the virtual machines (server farm and workstations) needed for the labs in this course • Use the vWorkstation to connect to the applications and virtual machines needed for this lab • Plan an initial reconnaissance and probing attack on the Virtual Security Cloud Lab (VSCL) • Use Zenmap GUI (Nmap) to perform an “Intense Scan” on the entire targeted VSCL infrastructure (172.30.0.0/24) • Generate a Zenmap GUI (Nmap) port scanning report and submit it as part of the deliverables for this lab Tools and sofTware Name FileZilla Server and FileZilla Client Nessus NetWitness Investigator PuTTY Tftpd32 Wireshark Zenmap GUI more INformatIoN http://filezilla-project.org/ http://www.nessus.org/products/nessus http://www.emc.com/security/rsa-netwitness.htm http://www.chiark.greenend.org.uk/~sgtatham/putty/ http://tftpd32.jounin.net/ http://www.wireshark.org/......

Words: 2926 - Pages: 12

Lab 1

...Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the......

Words: 467 - Pages: 2

Lab 3 for Ethical Hacking

...Kaplan University IT542 Ethical Hacking and Network Defense Unit 2 Assignment Assignment 2 Jamie Carter Professor North Assignment 2 1. Ping, DNS lookup, traceroute utilities, and, Internet Explorer, the web browser are primary tools that come equiped in Windows. The DOS or MSDOS allow use of ping and traceroute specifically, these utilities allow for network mapping and network address or IP address identification, as well as port information. 2. The differences in the organizations are coverage areas. IANA covers the resources delegated to the other organizations (IANA, N,d,). ARIN is delegated to cover the regions of United States, Canada, several parts of the Caribbean region, and Antarctica. RIPE covers northern parts of Asia, Northern Africa, Europe, and Middle Eastern countries. 3. Sam Spade includes tools that can run WhoIs, HTML source code retrieval, trace route, ping, finger, and nslookup. These functions allow retrieval of data from network traffic, electronic mail headers, and identify origins of addresses. 4 Trace route does exactly as the name states, it traces the route of packets back to the originator. This is useful in finding different jump points and pathways to the targeted website, It traces the routes packets take from the user to the target.   It shows a route by hops. They target the host address. 5. WhoIs provides general data such as address or domain owner, contact information for owner, and linked sites to a domain...

Words: 699 - Pages: 3

Lab 1

...Worksheet 15 1 Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap) LAb #1 – ASSESSMENT WORKSHEET Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Course Name and Number: Student Name: Instructor Name: Lab due date: Overview Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork. Note: These forms have been formatted to allow you to complete the form online and save it using Adobe Reader. You may experience problems with either or both of these actions if you are using any other software program. Lab Assessment Questions & Answers 1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually. windows applicaTion loaded 1. 2. 3. 4. 5. sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes q No q No q No q No q No 16 Lab #1 | Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) 2. What was the......

Words: 467 - Pages: 2

Lab 1

...a. An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. b. Black hat: Hacks systems to do damage, cause harm, or to steal information without a consent. Grey hat: Walks the line between good and evil hacking. These hackers have the potential to be either a white hat hacker or a black hat hacker. White hat: Gets hired by a company to hack into their system to test and see if there are potential weaknesses within the network. c. A malicious user is an individual or group who has the knowledge, skills, or access to compromise a system's security. A malicious user could be a black hat hacker, grey hat hacker, or and white hat hacker. d. Hacking your own system exposes your system’s weaknesses. Once your system’s weaknesses have been fixed, it decreases your chances of a potential threat. e. The goals of an ethical hacker is to use penetration testing methods on the customer’s system. It’s a structure means of investigating, uncovering, attacking and reporting. f. Trojan: Looks innocent, but its meant to cause harm. Malicious attacks: getting hacked. Spyware: is used to gather a user’s personal information. g. Formulate your plan, Execute your plan, Evaluate your results. 2. a. * Track what worked in previous tests and why. * Help prove what you did. * Correlate your testing with intrusion detection systems (IDSs) and other log files if......

Words: 499 - Pages: 2

Hacking

...Name: Holly Stark Lab #4: Implement Hashing & Encryption for Secure Communications Assessment Questions Student Name: Overview There’s my file! “Matthew Kreglo” + Holly Stark To correct this vulnerability, it looks like you mainly have to shut off “Autoplay”. There are more intrusive ways on how to do this at the Microsoft site: http://support.microsoft.com/kb/962007 Lab #4 Assessment Worksheet Compromise and Exploit a Vulnerable Microsoft Workstation/Server Overview During this Lab the student will learn the running of a port scan using Zenmap GUI for the discovery of running systems and services as well as open ports listening on the network. A vulnerability assessment scan will then be performed using Nessus® to identify known software vulnerabilities. Finally, a system running a vulnerable application will be exploited using a Backtrack 4 Live CD and the Metasploit Framework application. 1. What are the five steps of a hacking attack? There are different words and phrases on which step is labeled as what. a. Reconnaissance b. Scanning c. Gaining Access d. Maintaining Access e. Covering Tracks 2. During the Reconnaissance step of the attack, describe what ZenMap GUI performs to do passive OS fingerprinting? ZenMap (Nmap) doesn’t use probes to sniff specific hosts on the network. It rather doesn’t “touch” any systems on the network. It sniffs what is going on in the network and creates a fundamental report...

Words: 574 - Pages: 3

Lab 1

...Lab #1 1. List the five (5) steps of the Hacking process. Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks 2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? The first step would be the reconnaissance or footprinting step of the hacking process. 3. What applications and tools can be used to perform this initial reconnaissance and probing step? Whois query, ping sweeps, Nmap, etc 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? Social engineering is being used to by tricking people into giving out information that is not normally publicly available. 5. What does the enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? Enumeration is used to extract more-detailed and useful information from a victim’s system. 6. Explain how an attacker will avoid being detected following a successful penetration attack? Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into. 7. What method does an attacker use to regain access to an already penetrated system? The hacker will use a backdoor into the system 8. As a security professional, you......

Words: 581 - Pages: 3

Is4560 Lab 1 Assessment

...Lab 1 Assessment Worksheet Develop an Attack & Penetration Plan 1. List the 5 steps of the hacking process. * Reconnaissance * Scanning * Gaining Access * Maintaining Access * Covering Tracks 2. In order to exploit or attack the targeted systems, the first initial step I would do to collect as much information as possible about the targets prior to devising an attack and penetration test plan would be reconnaissance. I would use passive reconnaissance as this pertains to information gathering. 3. The reconnaissance phase can have many different faces, and depending on the goal of the attacker, various tools and applications can be used. Nslookup can be used to look up all the available host on a network through the DNS server. You can get IP address information of hosts on your targeted network. You can also get the information of the purpose of the hosts. Whois lookup is a protocol that can be used to interrogate the servers operated by regional internet registries which holds information about every IP/Domain registered on the internet. You can get information about your target such as; the name of the owner, address of the owner. IP ranges that a certain IP belongs to, contact information like emails and phone numbers, administrators names and server names. You can also just use your targets web site. Sometimes the targets website can reveal way too much information without realizing it, and just by looking at the information they......

Words: 1233 - Pages: 5

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see......

Words: 3168 - Pages: 13

Ethical Hacking Lab 1

...Lab #1 – Assessment Worksheet Assessing and Securing Systems on a Wide Area Network (WAN) IT-387 Ethical Hacking Course Name and Number: _____________________________________________________ Emmanuel Garcia Student Name: ________________________________________________________________ Jacob Boaheng Instructor Name: ______________________________________________________________ 09/29/2014 Lab Due Date: ________________________________________________________________ Overview In this lab, a systems administrator for the securelabsondemand.com network has reported odd behavior on two servers that support legacy applications you first conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1. What is the first Nmap command you ran in this lab? Explain the switches used. The first Nmap command I ran on the the lab was nmap -O -v 10.20.100.50. To explain the switches used winch are re presented with (-O) and (-v). (-O) means detect the operating system of the 10.20.100.50 machine and view or show the detail of the open ports. 2. What are the open ports when scanning 192.168.3.25 and their service names? After I have run the Nmap command for the 192.168.3.25 It show the port the were open such as port 80 HTTP hypertext transfer protocol, port 135 MSRPC Micro Soft Remote procedure Call, port 139 NetBios-ssn......

Words: 373 - Pages: 2

Lab 1

...1. List the five (5) steps of the Hacking Process. a. Foot-printing, Enumeration, System Hacking, Covering Tracks, Planting Backdoors 2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan? a. Foot-printing can be done as an initial first step to acquire as much information as possible on the victim’s system. 3. What applications and tools can be used to perform this initial reconnaissance and probing step? a. To perform the initial reconnaissance and probing step, you can examine a companies’ website, identify their key employees, and figure out which technologies and software the company may be using. Spiderfoot is an example of a foot-printing application that can be used. 4. How can social engineering be used to gather information or data about the organization’s IT infrastructure? a. Social engineering can be used to gather information or data about the organization’s IT infrastructure by vocally pretending to be someone they aren’t, like a system admin, to obtain information of the network. While pretending they are someone else they may watch you login to gain access to your credentials. 5. What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective? a. The Enumeration step allows a hacker to pull more detailed and useful information when hacking......

Words: 787 - Pages: 4

Ethical Hacking Lab 2

...Lab #2 – Assessment Worksheet Applying Encryption and Hashing Algorithms for Secure Communications Ethical Hacking Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files. Lab Assessment Questions & Answers 1. Compare the hash values calculated for Example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified. The harsh value would change because of course there is a change in data of the file "Example.txt" so if the file should be transfer from the source to the destination with different hash string, for example the source hash string is 3ddhyhhhs47878, and when it reach the destination......

Words: 662 - Pages: 3

Ethical Hacking Lab 05

...Dearing Lab Due Date: 3/28/16 Overview In this lab, you used the Damn Vulnerable Web Application (DVWA), a tool specifically designed with common vulnerabilities to help Web developers test their own applications prior to release. As an ethical hacker, you found and exploited a cross-site scripting (XSS) vulnerability and conducted a SQL injection attack on the Web application’s SQL database. You made your attacks using a Web browser and some simple command strings. You documented your findings throughout the lab. Lab Assessment Questions & Answers 1. Why is it critical to perform a penetration test on a Web application and a Web server prior to production implementation? To make sure no one can penetrate your web application before you put it in a live situation. 2. What is a cross-site scripting attack? Explain in your own words. Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others 3. What is a reflective cross-site scripting attack? A reflective attack a type of computer security vulnerability it involves the web application dynamically generating a response using non-sanitized data from the client scripts, like Java scripts or VB script, in the data sent to the server will send back a page with the script 4. Based on the tests you performed in this lab, which Web application attack......

Words: 490 - Pages: 2