Discuss different social engineering techniques

Assignment Help Computer Networking
Reference no: EM133969462

Penetration Testing and Countermeasures

Social Engineering and DNS Security

Part A - Social Engineering Tasks
1. Discuss different social engineering techniques (phishing, shoulder surfing, dumpster diving, piggybacking).
2. Provide one real-world example of each and explain how the attack could have been prevented. Get dependable, budget-friendly assignment help-starting today!
3. In small groups, role-play a social engineering attempt (e.g., an attacker calling IT support pretending to be an employee).

Part B - DNS Security
Objective: Learn how to identify DNS servers and test if they are vulnerable to zone transfer attacks.
Activity Steps:
Open a command line terminal in your Kali Linux or Windows environment.
Use the nslookup tool to find authoritative DNS servers for a target domain. Example:
nslookup
> set type=ns
> example.com
Once you have identified the DNS server, attempt a zone transfer using:
nslookup
> server dns.example.com
> ls -d example.com
If the zone transfer is successful, the server is vulnerable. If it fails, the server is properly secured.
Record your findings: Which DNS servers responded? Were any vulnerable to zone transfers?
Deliverable:
Write a two-page report including:
- Tools used (e.g., nslookup, dig, host)
- Steps followed
- Results of testing (whether zone transfers were allowed)
- Recommendations to secure DNS servers (e.g., disable zone transfers, restrict to secondary DNS servers only)

Reference no: EM133969462

Questions Cloud

Discuss some of reasons why people want to have children : Discuss some of the reasons why people want to have children and why others opt to be child-free.
Which condition do you suspect at this time in assessment : You are a PMHNP working the night shift in the emergency room. Which condition do you suspect at this time in your assessment?
What supply chain management is but : what supply chain management is but it is equally important to understand the difference between logistics and supply chain management.
What is structural functionalist theory of gender : Structural Functionalist Theory of Gender. Im writing an essay about Feminist and I wasnt sure about this term "Structural Functionalist Theory of Gender."
Discuss different social engineering techniques : Discuss different social engineering techniques (phishing, shoulder surfing, dumpster diving, piggybacking) and Provide one real-world example of each
What would you advise the patient : She wonders if it is safe to take St. John's wort for now and consider starting an antidepressant in the future. What would you advise the patient?
Determine when ethical deciding to transition individuals : Employers can consider several criteria that might be used to determine when ethical deciding to transition individuals to full-time status
Why the richer are getting richer and the poor poorer : Explains a change or some new reasons why the richer are getting richer and the poor poorer; don't discuss the age-old reasons for this gap.
How can buffer overflow vulnerabilities be exploited : How can buffer overflow vulnerabilities be exploited in operating systems - What are two best practices you would recommend for hardening OS systems

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd