logo

Investigating the activities of Philip Price

   

Added on  2021-04-21

19 Pages1309 Words493 Views
 | 
 | 
 | 
Table of Contents1.Introduction.......................................................................................................................................22.Scanning.............................................................................................................................................23.VM Creation......................................................................................................................................34.SSH attack........................................................................................................................................105.Continued Access.............................................................................................................................126.Proxy Implementation.....................................................................................................................167.Conclusion........................................................................................................................................178.References........................................................................................................................................171
Investigating the activities of Philip Price_1

1.IntroductionIt is suspected that one of the employee "Philip Price" is leaking out the company's details to the outside world. The investigation will be for monitoring the activities of Price and his usage of thecompany's computer system. The entire network will be scanned, the target computer (Philip's computer) will be identified. Target PC will be accessed by bye-passing the credentials, attaching the SSH of the system. A proxy will be setup to monitor the traffic of the target system.Suitable methods will be implemented to access the target system at any time whenever the target system is in ON state. Entire activity is a part of white hat hacking (Venue, 2012) and the results of the white hat hacking will be published.2.ScanningNMAP (Nmap.org, 2018) is installed in a windows system. It is a security scanner. It scanned allthe network and gave a network map. It displayed all the swathed systems and the open ports in those systems. Target system found to be "price-pc". NMAP is assigned to scan only the target system. Nmap sent a special packets to the target system and analyzed the responses. This tool the following activities.1. Host discoveryIt discovered all the switched on systems in the network2. Port ScanningIt displayed the open ports in the target system3. Services identificationNMAP identified the services running in the target system along with the version of the services4. Operating system identificationNMAP found the operating system of the target system.NMAP gave lot of other information as follows2
Investigating the activities of Philip Price_2

Security settings and the devices in the network, open ports of the network, asset details, new servers in the network, existing vulnerabilities of the network.The outputs came as a XML file, line oriented tools, normal outputIn our task we ran the following command.nmap 192.168.1.0/24 -p223.VM CreationCreated VM with kali linux to access the target system. Kali linux got all the tools to crack the password of the target system and to create a back door to access the target system whenever we need.Installed vmware work station.3
Investigating the activities of Philip Price_3

Downloaded Kali linux ISO from https://www.kali.org/downloads/4
Investigating the activities of Philip Price_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.
|29
|1680
|33

Information System Threats Attacks and Defences
|35
|2571
|18

Implementation and Evaluation of Penetration Testing Tools
|7
|969
|40

ETHICAL. HACKING. CONTENTS. Ethical Hacking. Why Ethica
|16
|313
|90

Assignment | Cyber Security
|23
|2174
|14

After attending the meeting
|7
|853
|15