logo

Ethical Hacking and Defence: A Case Study

   

Added on  2023-06-04

19 Pages1954 Words321 Views
0
Ethical Hacking and Defence

Executive Summary
Ethical hacking refers to a method to accurately analyses any organisation's data security
structure. It is observed that the IT professionals known as ethical hackers are increasing in
number and are gaining high status. These ethical hacker intentionally penetrate the security
systems for fixing the weak points. Here, the report completely deals with ethical hacking by
using a provided case study. The points determined from the case study displays five flags,
which are discussed briefly.

Table of Contents
1. Purpose of the Project......................................................................................................1
2. Log Testing and the followed Methodology...................................................................1
1.1 Flag: 1- Web server...................................................................................................2
1.2 Flag: 2- Web Shells....................................................................................................3
1.3 Flag: 3- Password cracker........................................................................................4
1.4 Flag: 4- TCP port scanner – NMAP......................................................................10
1.5 Flag: 5- Privilege......................................................................................................12
3. Result and Conclusion....................................................................................................12
4. Source Code.....................................................................................................................12
4.1 NMAP – TCP port Scanner....................................................................................12
4.2 Password Cracker...................................................................................................13
5. Completion instructions.................................................................................................13
References...............................................................................................................................14

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking: Techniques and Case Study
|24
|3516
|371

Ethical Hacking Report: Penetration Testing and Techniques
|16
|3773
|437

Ethical Hacking and Defense: Case Study Analysis
|11
|2129
|440

Ethical Hacking: Case Study on Infiltration and Root Level Privileges
|18
|2573
|133

Ethical Hacking and Defence: Flags, Web Shells, and System Security
|14
|3249
|79

Ethical Hacking: Methodology, Testing Log, and Outcomes
|23
|3194
|165