logo

Real World Practices For Cyber Security

   

Added on  2022-07-28

25 Pages2512 Words39 Views
Running head: Real world practices for Cyber Security
Real world practices for Cyber Security
Name of the Student
Name of the University
Author notes

Real world practices for Cyber Security
2
Task:
1. Kali VM started:
2. Running terminal:

Real world practices for Cyber Security
3
Q1:
a. Shell:
The shell is basically a command interpretor in an OS such as GNU Linux or UNIX. The shell is
basically a program which can execute other program. This offers an user an interface to the
GNU Linux or Unix system so that the user will be having the ability to run various commands
or tool or utilities with some input data.
b. Terminal:
The terminal window is also known as terminal emulator, it is basically a text only command
based window in a graphical user interface which can emulate a console. The terminal and
console are basically two kinds of command line interface in Linux OS.
c. A terminal is basically a session that is able to send and receive input and output for the
command line based programs. On the other side, the shell is basically a program that is utilized

Real world practices for Cyber Security
4
to control and run programs. A terminal emulator can often run a shell for allowing users to work
interactively on a command line. All the Operating systems come with a Shell or a terminal.
3.
Q2:
Screenshot:
kali@kali:~$ whois deakin.edu.au
Domain Name: DEAKIN.EDU.AU
Registry Domain ID: D407400000000454108-AU
Registrar WHOIS Server: whois.auda.org.au
Registrar URL: https://www.domainname.edu.au
Last Modified: 2019-03-01T08:15:08Z
Registrar Name: EDUCATION SERVICES AUSTRALIA LIMITED
Registrar Abuse Contact Email: registrar@esa.edu.au
Registrar Abuse Contact Phone: +61.399109829
Reseller Name:
Status: serverRenewProhibited https://afilias.com.au/get-au/whois-status-
codes#serverRenewProhibited

Real world practices for Cyber Security
5
Registrant Contact ID: EDU3766-R
Registrant Contact Name: Web Manager
Tech Contact ID: EDU3766-R
Tech Contact Name: Web Manager
Name Server: A24-64.AKAM.NET
Name Server: A28-65.AKAM.NET
Name Server: A4-66.AKAM.NET
Name Server: A5-67.AKAM.NET
Name Server: A7-64.AKAM.NET
Name Server: A1-135.AKAM.NET
DNSSEC: unsigned
Registrant: DEAKIN UNIVERSITY
Registrant ID: ABN 56721584203
Eligibility Type: Higher Education Institution
>>> Last update of WHOIS database: 2020-04-17T06:13:09Z <<<
a) The listed name servers are:
Name Server: A24-64.AKAM.NET
Name Server: A28-65.AKAM.NET
Name Server: A4-66.AKAM.NET
Name Server: A5-67.AKAM.NET
Name Server: A7-64.AKAM.NET
Name Server: A1-135.AKAM.NET
The domain is having multiple name servers as using multiple servers depend on needs and
requirement. The main purpose of having more than 1 name server for a domain is redundancy.
Multiple name servers are for handling the children and the subdomains by some other set of
name servers.
b. DNSSEC: The DNSSEC stands for Domain Name System Security Extensions that is a suite
of IETF (Internet Engineering Task Force) specifications for giving security of several types of
information that are provided by the DNS (Domain name system as utilized in the internet
protocol networks.
In the Domain Name System Security Extensions, the unsigned high level domains or the
registrars are not having support of DNSSEC delegations which means the admins of the lower
level domains might utilize the DLV for allowing the data of their DNS for being validated by
the resolvers that had been configured for utilizing DLV.
4.
Q3. Screenshot:

Real world practices for Cyber Security
6
kali@kali:~$ whois discorapp.com
Domain Name: DISCORAPP.COM
Registry Domain ID: 2005919945_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.regtons.com
Registrar URL: http://regtons.com
Updated Date: 2020-02-16T23:34:34Z
Creation Date: 2016-02-24T08:16:35Z
Registry Expiry Date: 2021-02-24T08:16:35Z
Registrar: Gransy, s.r.o.
Registrar IANA ID: 1505
Registrar Abuse Contact Email: abuse@regtons.com
Registrar Abuse Contact Phone: +420.734 463 373
Domain Status: ok https://icann.org/epp#ok

End of preview

Want to access all the pages? Upload your documents or become a member.