Example of an attack against a windows, Computer Network Security

Assignment Help:

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to discover vulnerabilities in a system,

b) how a vulnerability can be exploited using Metasploit, c) the Meterpreter functionality d) a password

cracking example, e) the Netcat functionality, f) how an attacker can gain GUI access into a remote system. In the discussion below Bt4 and WinXP refer to virtual machines Backtrack4-Final and Windows XP SP2, respectively; although Bt4 is used here, similar steps will be used in the case of Bt5. Note that red color is used for the commands. In this example, I discuss the steps that I followed. It is strongly recommended that you use your own virtual machines and follow the same steps as you go over this example; in this case you have to replace my settings such as last name, IP address, etc. with your settings.

212_Example of an Attack against a Windows.png

As you can see above, my Bt4 has address 192.168.58.130; your Bt4 will have a different IP address. Note that WinXP should be on the same subnet with Bt4. This means that, in my case, the leftmost three bytes of the WinXP address must be "192.168.58". Thus, I can find its IP address by using an Nmap SYN scan. Before I proceed, I disconnected from the Internet and disabled all firewalls, antivirus software, and access controls that were running on my laptop. I did that because these tools will interfere with the Bt4, WinXP interaction and prevent me from analyzing correctly as well as exploiting the vulnerabilities of WinXP. After I had finished with this exercise, I re-enabled all these security tools before I connected back to the Internet.


Related Discussions:- Example of an attack against a windows

What do you understand by demilitarized zone, Problem 1: What does the ...

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

What do you meant by the term diffusion and confusion, Question: (a) W...

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

Difference between synchronous tdm and statistical tdm, Question (a) A CRC...

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

What is the size of the initialization vector n wpa, Question : Wi-Fi p...

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Describe des encryption, (a) Describe DES encryption with a block diagram a...

(a) Describe DES encryption with a block diagram and brief steps. (b) How does triple DES improve security. What is the effective key length of triple DES? How can 3DES be compa

Wireless security tools, WIRELESS SECURITY TOOLS An organization which s...

WIRELESS SECURITY TOOLS An organization which spends its time securing wired network and leaves wireless networks to operate in any manner is opening itself up for security brea

Social network development in java , Social Network development in Java: ...

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd