Analyse cyber security threats and attacks

Assignment Help Other Subject
Reference no: EM133015760

MN623 Ethical Hacking and Analytics

Penetration Testing on FTP Server with Brute-Force Attacks

Learning Outcome:

- Analyse cyber security threats and attacks
- Implement and evaluate security testing tools in a realistic computing environment

Practical Tasks:
During the next two sessions, you will learn how to perform penetration testing on the FTP server (using port 21) with the Brute-Force Password Guessing Attacks.
For the testing environment, we will use the FTP server installed on either Linux or Windows machine (follow the lecturers instructions). You can extend your skills to perform penetration testing on a mainframe server for a major enterprise.
Open the penetration testing lab environment

1. Open the lab environment with Kali-Linux and FTP Victim Machine.
Create Wordlist attack file with CRUNCH Command

2. Use CRUNCH command to create a Wordlist attack file with the length of 3 using letters ABCD only - display the output in your report.

3. Use CRUNCH command to create a Wordlist attack file with length between 3 and 4 using letters ABCDE only - generate the output as a Text file to the folder of your choice (e.g. /root/Desktop/ on Kali Linux).

4. Report the command to create a Wordlist attack file with length of 8 with all English alphanumeric characters using CRUNCH command (do not run this command as it will take a very long time to process).
Configure FTP Username and Password on Windows XP

5. On the FTP server, create a FTP user account with username ‘admin' with a simple password ‘1234'.

6. On the FTP server, create another FTP user account with username ‘user' with a stronger password ‘user123'.
Attack FPT Server

7. Use either JOHNNY or HYDRA attack commands to perform penetration testing on the FTP server

8. Show the evidence of successful FTP connection
Review the Attack Scenario

9. Discuss the difference(s) between JOHNNY attack and HYDRA attack

10. Discuss how you can secure the FTP servers.

Attachment:- Ethical Hacking and Analytics.rar

Reference no: EM133015760

Questions Cloud

Changing ownership of files and folders : Demonstrate the slight differences in permissions for files and directories - This manual is for running experiments on Access Control and Files System Security
Find the amount of operating income in the flexible budget : In September, Larson Inc. sold 40,000 units of its only product for $262,000, Find the amount of operating income in the flexible budget
What will the firm true cost of debt be : Costly Corporation plans a new issue of bonds with a par value of $1000, a maturity of 37 years, What will the firm true cost of debt be
What is the expected annual growth rate : A company has stock which costs $42.00 per share and pays a dividend of $2.70 per share this year. What is the expected annual growth rate
Analyse cyber security threats and attacks : Analyse cyber security threats and attacks and Implement and evaluate security testing tools in a realistic computing environment
Present the journal entries to represent these transactions : On 1 January 2020, Tabasamu Ltd pays Kshs.100 million to acquire 50% of shares in Furaha Ltd. Present the journal entries to represent these transactions
Evaluate the hedging alternatives for chronos : Evaluate the hedging alternatives for Chronos if Manny is right? (Case 1: ?$1.1598?/€?) and if Manny is wrong? (Case 2: $1.2687/€?). What do you? recommend
How much is the business worth : She plans to buy four bikes now and to then add a fifth bike at the end of the second year. Each bike will cost $20,000. How much is the business worth
Discuss the possible applications of ansoff growth matrix : Discuss the possible applications of Ansoff's growth matrix and support your viewpoint with the example of a company which has successfully implemented the same

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd