Example of an attack against a windows, Computer Network Security

Assignment Help:

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to discover vulnerabilities in a system,

b) how a vulnerability can be exploited using Metasploit, c) the Meterpreter functionality d) a password

cracking example, e) the Netcat functionality, f) how an attacker can gain GUI access into a remote system. In the discussion below Bt4 and WinXP refer to virtual machines Backtrack4-Final and Windows XP SP2, respectively; although Bt4 is used here, similar steps will be used in the case of Bt5. Note that red color is used for the commands. In this example, I discuss the steps that I followed. It is strongly recommended that you use your own virtual machines and follow the same steps as you go over this example; in this case you have to replace my settings such as last name, IP address, etc. with your settings.

212_Example of an Attack against a Windows.png

As you can see above, my Bt4 has address 192.168.58.130; your Bt4 will have a different IP address. Note that WinXP should be on the same subnet with Bt4. This means that, in my case, the leftmost three bytes of the WinXP address must be "192.168.58". Thus, I can find its IP address by using an Nmap SYN scan. Before I proceed, I disconnected from the Internet and disabled all firewalls, antivirus software, and access controls that were running on my laptop. I did that because these tools will interfere with the Bt4, WinXP interaction and prevent me from analyzing correctly as well as exploiting the vulnerabilities of WinXP. After I had finished with this exercise, I re-enabled all these security tools before I connected back to the Internet.


Related Discussions:- Example of an attack against a windows

What is network address translation, Question: (a) What is Network Add...

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

#title., differentiate between internet and www

differentiate between internet and www

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Information security policy practices and standards, INFORMATION SECURITY P...

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic

Ethical hacking penetration testing, Get a copy of Metasploitable at Make...

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po

Area subdivision, the advantages and disadvantages of area subdivision and ...

the advantages and disadvantages of area subdivision and where it is applicable

Datagram reassembly, DATAGRAM REASSEMBLY Recreation of original datagr...

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

Cipher methods-cryptography, Cipher Methods There are 2 methods of encry...

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

What is the role of an intrusion detection system, Problem: (a) What i...

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd