preview

Phase 2 : Lab Analysis

Good Essays

The “Phase 2: Scanning” portion of the lab instructions were very confusing as they give commands to research and test but this portion of the lab has no interconnectivity to the internet. After much wasted time and talking to the lab assistances, it was noted that the students weren’t supposed to test in this environment but it was just information only and bringing up the help file. To offset and further understand this, the student set up a separate lab environment using Virtual Box with a Kali iso. All the main commands were tested with some different variation of options on a number of sites; advancedmissiongroup.com (the students own personal IP address but with no website), largobooks.com, and umuc.edu. Figure 10 demonstrates the …show more content…

The only thing better than gaining access to a system and keeping it is the ability to do it covertly or without anyone knowing what you did. In speaking with covert officers from the CIA who break into many kinds of locks and security, I found that lock picking is not the preferred method because you have to pick the lock open and then pick the lock closed again. Their mission is to work covertly and if someone knows they were there, it is a failed mission. According to the CEH prep exam book, “Hackers are much like other criminals in that they would like to be sure to remove all evidence of their activities. This might include using rootkits or other tools to cover their tracks. Other hackers might hunt down log files and attempt to alter or erase them” (Gregg, 2006). Covering tracks is maintaining a security awareness by sniffing internal systems for new counter measures could be an ongoing process to stay ahead of security. Appendix B Results. The second part of this lab is the actual exercise where the student will use the penetration testing tools and perform more active reconnaissance, and demonstrate gaining access through exploits found. Again, all step by step instructions can be found in Appendix B. The following are a summary and specific results that are called out in the lab. Part 1 is mainly set up and getting used to a tool called “httrack” to scrap or duplicate a known website we are using

Get Access