Example of an attack against a windows, Computer Network Security

Assignment Help:

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to discover vulnerabilities in a system,

b) how a vulnerability can be exploited using Metasploit, c) the Meterpreter functionality d) a password

cracking example, e) the Netcat functionality, f) how an attacker can gain GUI access into a remote system. In the discussion below Bt4 and WinXP refer to virtual machines Backtrack4-Final and Windows XP SP2, respectively; although Bt4 is used here, similar steps will be used in the case of Bt5. Note that red color is used for the commands. In this example, I discuss the steps that I followed. It is strongly recommended that you use your own virtual machines and follow the same steps as you go over this example; in this case you have to replace my settings such as last name, IP address, etc. with your settings.

212_Example of an Attack against a Windows.png

As you can see above, my Bt4 has address 192.168.58.130; your Bt4 will have a different IP address. Note that WinXP should be on the same subnet with Bt4. This means that, in my case, the leftmost three bytes of the WinXP address must be "192.168.58". Thus, I can find its IP address by using an Nmap SYN scan. Before I proceed, I disconnected from the Internet and disabled all firewalls, antivirus software, and access controls that were running on my laptop. I did that because these tools will interfere with the Bt4, WinXP interaction and prevent me from analyzing correctly as well as exploiting the vulnerabilities of WinXP. After I had finished with this exercise, I re-enabled all these security tools before I connected back to the Internet.


Related Discussions:- Example of an attack against a windows

Example of an attack against a windows, The objective of this example is to...

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Star topology, STAR TOPOLOGY In this topology, all devices are attache...

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

Configuration for 3des, (a) Explain the two possible configuration for 3DE...

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

Distinguish between steganograhy and cryptography, Question: (a) Disti...

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Deployment and implementing of an ids, DEPLOYMENT AND IMPLEMENTING OF AN ID...

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Explain why spreadsheets are so useful, Question: Spreadsheet packages ...

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Describe the use of control channels in gsm network, Problem 1: What is...

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Briefly explain the following security goals, (a) Briefly explain the fo...

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd