Unit 4 Lab - Remote And Local Exploitation And Enumerating

Question # 00853017 Posted By: wildcraft Updated on: 04/11/2024 01:32 AM Due on: 04/11/2024
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Unit 4 Lab: Remote And Local Exploitation And Enumerating Hosts Using Wireshark, Windows, And Linux Commands

Conduct research and cite supporting sources in APA format where appropriate.

  1. Discuss one measure that organizations can take to protect themselves from each of these attacks - ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.” 
  2. Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
  3. Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
  4. What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
  5. Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
  6. Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:

naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::

  1. Which algorithm was used to hash the password?
  2. What is the maximum number of days the password is valid?
  3. What is the date that this account will expire?
Dot Image
Tutorials for this Question
  1. Tutorial # 00848498 Posted By: wildcraft Posted on: 04/11/2024 01:33 AM
    Puchased By: 2
    Tutorial Preview
    The solution of Unit 4 Lab - Remote And Local Exploitation And Enumerating...
    Attachments
    Unit_4_Lab_-_Remote_And_Local_Exploitation_And_Enumerating.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa