Investigating the activities of Philip Price
Added on 2021-04-21
19 Pages1309 Words493 Views
|
|
|
Table of Contents1.Introduction.......................................................................................................................................22.Scanning.............................................................................................................................................23.VM Creation......................................................................................................................................34.SSH attack........................................................................................................................................105.Continued Access.............................................................................................................................126.Proxy Implementation.....................................................................................................................167.Conclusion........................................................................................................................................178.References........................................................................................................................................171
1.IntroductionIt is suspected that one of the employee "Philip Price" is leaking out the company's details to the outside world. The investigation will be for monitoring the activities of Price and his usage of thecompany's computer system. The entire network will be scanned, the target computer (Philip's computer) will be identified. Target PC will be accessed by bye-passing the credentials, attaching the SSH of the system. A proxy will be setup to monitor the traffic of the target system.Suitable methods will be implemented to access the target system at any time whenever the target system is in ON state. Entire activity is a part of white hat hacking (Venue, 2012) and the results of the white hat hacking will be published.2.ScanningNMAP (Nmap.org, 2018) is installed in a windows system. It is a security scanner. It scanned allthe network and gave a network map. It displayed all the swathed systems and the open ports in those systems. Target system found to be "price-pc". NMAP is assigned to scan only the target system. Nmap sent a special packets to the target system and analyzed the responses. This tool the following activities.1. Host discoveryIt discovered all the switched on systems in the network2. Port ScanningIt displayed the open ports in the target system3. Services identificationNMAP identified the services running in the target system along with the version of the services4. Operating system identificationNMAP found the operating system of the target system.NMAP gave lot of other information as follows2
Security settings and the devices in the network, open ports of the network, asset details, new servers in the network, existing vulnerabilities of the network.The outputs came as a XML file, line oriented tools, normal outputIn our task we ran the following command.nmap 192.168.1.0/24 -p223.VM CreationCreated VM with kali linux to access the target system. Kali linux got all the tools to crack the password of the target system and to create a back door to access the target system whenever we need.Installed vmware work station.3
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
INFORMATION SYSTEM THREATS, ATTACKS AND DEFENSES.lg...
|29
|1680
|33
Information System Threats Attacks and Defenceslg...
|35
|2571
|18
Implementation and Evaluation of Penetration Testing Toolslg...
|7
|969
|40
ETHICAL. HACKING. CONTENTS. Ethical Hacking. Why Ethicalg...
|16
|313
|90
Assignment | Cyber Securitylg...
|23
|2174
|14
After attending the meetinglg...
|7
|853
|15