Analyse cyber security threats and attacks

Assignment Help Other Subject
Reference no: EM133015760

MN623 Ethical Hacking and Analytics

Penetration Testing on FTP Server with Brute-Force Attacks

Learning Outcome:

- Analyse cyber security threats and attacks
- Implement and evaluate security testing tools in a realistic computing environment

Practical Tasks:
During the next two sessions, you will learn how to perform penetration testing on the FTP server (using port 21) with the Brute-Force Password Guessing Attacks.
For the testing environment, we will use the FTP server installed on either Linux or Windows machine (follow the lecturers instructions). You can extend your skills to perform penetration testing on a mainframe server for a major enterprise.
Open the penetration testing lab environment

1. Open the lab environment with Kali-Linux and FTP Victim Machine.
Create Wordlist attack file with CRUNCH Command

2. Use CRUNCH command to create a Wordlist attack file with the length of 3 using letters ABCD only - display the output in your report.

3. Use CRUNCH command to create a Wordlist attack file with length between 3 and 4 using letters ABCDE only - generate the output as a Text file to the folder of your choice (e.g. /root/Desktop/ on Kali Linux).

4. Report the command to create a Wordlist attack file with length of 8 with all English alphanumeric characters using CRUNCH command (do not run this command as it will take a very long time to process).
Configure FTP Username and Password on Windows XP

5. On the FTP server, create a FTP user account with username ‘admin' with a simple password ‘1234'.

6. On the FTP server, create another FTP user account with username ‘user' with a stronger password ‘user123'.
Attack FPT Server

7. Use either JOHNNY or HYDRA attack commands to perform penetration testing on the FTP server

8. Show the evidence of successful FTP connection
Review the Attack Scenario

9. Discuss the difference(s) between JOHNNY attack and HYDRA attack

10. Discuss how you can secure the FTP servers.

Attachment:- Ethical Hacking and Analytics.rar

Reference no: EM133015760

Questions Cloud

Changing ownership of files and folders : Demonstrate the slight differences in permissions for files and directories - This manual is for running experiments on Access Control and Files System Security
Find the amount of operating income in the flexible budget : In September, Larson Inc. sold 40,000 units of its only product for $262,000, Find the amount of operating income in the flexible budget
What will the firm true cost of debt be : Costly Corporation plans a new issue of bonds with a par value of $1000, a maturity of 37 years, What will the firm true cost of debt be
What is the expected annual growth rate : A company has stock which costs $42.00 per share and pays a dividend of $2.70 per share this year. What is the expected annual growth rate
Analyse cyber security threats and attacks : Analyse cyber security threats and attacks and Implement and evaluate security testing tools in a realistic computing environment
Present the journal entries to represent these transactions : On 1 January 2020, Tabasamu Ltd pays Kshs.100 million to acquire 50% of shares in Furaha Ltd. Present the journal entries to represent these transactions
Evaluate the hedging alternatives for chronos : Evaluate the hedging alternatives for Chronos if Manny is right? (Case 1: ?$1.1598?/€?) and if Manny is wrong? (Case 2: $1.2687/€?). What do you? recommend
How much is the business worth : She plans to buy four bikes now and to then add a fifth bike at the end of the second year. Each bike will cost $20,000. How much is the business worth
Discuss the possible applications of ansoff growth matrix : Discuss the possible applications of Ansoff's growth matrix and support your viewpoint with the example of a company which has successfully implemented the same

Reviews

Write a Review

Other Subject Questions & Answers

  Reasons europe has withdrawn from a close relationship

What does it mean when they say that most European countries have “divorced America.” Explain the main reasons Europe has withdrawn from a close relationship with the U.S.

  Reaction to measure the got activity

How will you start the reaction to measure the GOT activity (which component of the reaction will you add?). Why is rapid and complete mixing crucial to good quality results?

  Evaluate the difficulties that may surface as a result

Evaluate the difficulties that may surface as a result of having a different belief system than your clients and share your reflections on this topic in 250-300

  Describe and analyse the types of power exercised

Use the taxonomies studied so far in this course to describe and analyse the types of power exercised. Offer evidence or speculate how the power instruments.

  Cave of forgotten dreams

Watch "Cave of Forgotten Dreams" Werner Herzog (on youtube or netflix)

  What statement does she make about race in america

The Younger Family faces internal and external conflicts in this play, what factors does Hansberry suggest have the greatest impact on the outcome of the story?

  Explain the Wagner Model for chronic illness

Describe the characteristics of a chronic illness or disease as per the World Health Organisation and Explain the Wagner Model for chronic illness

  Discussing federal policies

Pick two similar federal policies that were discussed over a span of two different administrations. For example, President Clinton's and Obama's health care policies or President's George H.W. Bush's and George W. Bush's foreign policy.

  CAI 515 Curriculum Development Assignment

CAI 515 Curriculum Development Assignment Help and Solution, Abu Dhabi University - Assessment Writing Service - Reflect the focus of your review

  Which one does not represent a complementary system

According to opponent-process theory, all but one of the pairs below represent complementary systems. Which one does NOT represent a complementary system?

  Discuss where you might expect to find each of these items

give an example of some porous items that may be found at a crime scene and identify at least four different

  Psychology ap intro questions

Please answer all questions, DO NOT copy any information from the web. Provide examples and explanations for each question.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd