4
.docx
keyboard_arrow_up
School
ECPI University, Manassas *
*We aren’t endorsed by this school
Course
411
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
6
Uploaded by sidorelakollcaku
Nadia Avdiu
CIS 411
Professor Wilent
Date 1-17-2023
4.3 Performance Assessment
Hacking Mobile Devices
a. Using any of the tools available on the ParrotOS virtual machine, perform attack on the Android phone using msfvenom to create a payload. Provide screenshot of payload creation on ParrotOS
b. Create a web server on Parrot OS apache2 to deliver the msfvenom exploit document this screenshot once completed.
C. Provide a screenshot of the Android OS while the msfvenom exploit is installed
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
For the CoinMiner malware, please write a short paragraph based on the given background and website info:
CoinMiner – Trojan
CoinMiner is a cryptocurrency miner family that typically uses Windows Management Instrumentation (WMI) to spread across a network. Additionally, it often uses the WMI Standard Event Consumer scripting to execute scripts for persistence. However, the malware’s capabilities may vary since there are multiple variants. CoinMiner spreads through malspam or is dropped by other malware.
https://www.cisecurity.org/insights/blog/top-10-malware-december-2022
Coin Miner is a malware type that uses the hardware elements of the victim’s PC to mine cryptocurrencies. Most often, crooks who control such coin miner virus (Monero (XMR) or (Litecoin an example), as they are the easiest for mining. They can use the software that is similar or even completely repeats the one used for legit mining, but with a key difference - people whose hardware is used never agreed for this.…
arrow_forward
2.
Configure Snort to log suspicious activity on the Untrusted and DMZ interfaces.
Configure Snort to alert to the types of exploits you performed in the previous ethical hacking
in VM box pfsense firewall
arrow_forward
Which of the following best describes how the logging approach called "centralized logging" is different from its counterpart
approach?
(A) It generates logs for changes in firewall policy.
(B) It generates a log record for exceeding thresholds.
C) It generates a log record for a successful or failed alteration of user access privileges.
(D) It generates a log for a failed or successful modification of user credentials and access rights.
arrow_forward
Which of the following best describes how the logging approach called "local logging" is different from its counterpart approach?
(A) It works in four parts: log collection, transport, storage, and analysis.
B
It records changes to firewall policy.
It collects and aggregates logs in one central location.
D It is used by systems that have a limited number of hosts.
arrow_forward
Match the MITRE ATT&CK Tactic to the Technique it falls into folowing:
Which one of the below match with execution?
Steal application access token
Scheduled task/job
Command and scripting interpreter
Traffic signaling
Supply chain compromise
Build image on host
Exportation of remote services
Gather victim host information
arrow_forward
you must provide training videos for the networking staff using Windows Server 2019. Additionally, these videos will be hosted on an Apache web server running on Ubuntu Server 20. Find a cloud service provider that will allow you to create 4 VMs: 2 of these VMs will be the two OS from scenario 1 moved to the cloud, the third VM will be running Windows Server 2019, and the fourth VM will be for the Apache web server hosting all of the videos.
justifying the cost of the solution, and analyzing the security aspects (good/bad) of the solution.
arrow_forward
Match the MITRE ATT&CK Tactic to the Technique it falls into folowing:
Which one of the below match with initial access?
Steal application access token
Scheduled task/job
Command and scripting interpreter
Traffic signaling
Supply chain compromise
Build image on host
Exportation of remote services
Gather victim host information
arrow_forward
What was the name of the non-free Linux firewall, and how would you summarise it in a few sentences?
arrow_forward
For the Gh0st malware, please write a short paragraph based on the given background and website info:
Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into many sensitive computer networks. It is a cyber spying computer program. The "RAT" part of the name refers to the software's ability to operate as a "Remote Administration Tool".
The GhostNet system disseminates malware to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected. According to the Infowar Monitor (IWM), "GhostNet" infection causes computers to download a Trojan known as "Gh0st RAT" that allows attackers to gain complete, real-time control. Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear…
arrow_forward
Match the MITRE ATT&CK Tactic to the Technique it falls into folowing:
Which one of the below match with lateral movement?
Steal application access token
Scheduled task/job
Command and scripting interpreter
Traffic signaling
Supply chain compromise
Build image on host
Exportation of remote services
Gather victim host information
arrow_forward
Question 6 sm6. What is the goal of an HTTP flood attack?7. What defences are possible against a DNS amplification attack?8. What is the difference between a DDoS attack and a classic DoS attack
Full explain this question and text typing work only
arrow_forward
What is it about the configuration of the Ubuntu firewall that could confuse the user about its actual status?
arrow_forward
Joe Green, a system administrator for a large corporation, is installing a new software package on Chuck Dennis’ personal computer. The company has not authorized Joe to read the employees’ e-mail, Web logs, or personal files. However, in the course of installing the software, he accidentally comes across directories containing files with suspicious-looking names. He opens a few files and discovers they contain child pornography. Joe believes possessing such images is unethical for their profession. What should he do?
Acme Corporation licenses a sophisticated software package to many private and government agencies. Kyla is one of Acme's employees who works in the support organization. She mostly provides phone support but also teaches an on-site class from time to time. In fact, she created many of the instructional materials used in these classes. One day Kyla gets a call from Maria, who works for a government agency that uses Acme's software package. Maria offers to pay Kyla Php…
arrow_forward
Describe the security behavior of a Java Enterprise Edition environment by explaining how native authentication and authorization services are deployed step-by-step when a web client requests access to protected resources oExplain the steps used by a Java Enterprise Edition environment to install native authentication and authorization services when a web client requests access to restricted resources on a web server. Insist on proper APA style use.n a web server. Please use APA format accurately
arrow_forward
Which of the following best describes how the
logging approach called "local logging" is different
from its counterpart approach?
A
It works in four parts: log collection
transport, storage, and analysis.
B
It records changes to firewall policy
C
It collects and aggregates logs in one
central location.
D
It is used by systems that have a limited
number of hosts.
arrow_forward
Which system attacks are distinguished by their ability to replicate?
A.
Trojan Horse and Stack Overflow.
B.
Rootkits and trap doors.
C.
Worms and viruses.
D.
Trojan horse and botnets.
arrow_forward
What is the (functional) difference between Bitlocker and Microsoft’s other file encryption, EFS?
arrow_forward
What is the definition of salt?
How does salt defend against brute force assaults?
arrow_forward
Suppose that you are a computer virus writer; hence, you know that you need to store a copy of the code for your virus inside the virus itself. Moreover, suppose you know that a security administrator is also aware of this fact and will be using it to detect the presence of your virus in operating systems files.
Explain how you can hide the embedded copy of your virus so that it is difficult for the security administrator to find it.
Explain how a stateless firewall would block all incoming and outgoing HTTP requests.
What is the encryption of the following string using the Caesar cipher: THELAZYFOX?
Why can't Bob use the pair (6; n) as an RSA public key, where n = pq, for two large primes, p and q?
arrow_forward
DO NOT COPY FROM OTHER WEBSITES
Upvote guarenteed for a correct and detailed answer. Thank you!!!
arrow_forward
Discuss the following types of security vulnerabilities that affect code:
Buffer Overflow
Code Injection.
You have an online web store having URL mystore.com.
Explain why the following hyperlinks (URL) are not very safe, and how will you make them secure:
http://www. com/ distributor/distributor.asp?distID=123
http://www. com/changepassword.php?userID=123
arrow_forward
What is a denial of service attack (DOS)? Who would use it and why? What is a distributed denial of service(DDOS) attack?
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).
BIUS
Paragraph
Arial
10pt
三、
A v
II
arrow_forward
The network address for an organisation’s network is 54.33.112.0/23. Provide the subset of the filter table for a stateless firewall that includes the following rules:- Allows all internal users to establish HTTP with any external hosts but blocks FTP.- Allows external users to browse the company web page at 54.33.112.4- Allow incoming TELNET requests to all organisation hosts apart from those in subnet 54.33.112.0/24THIS IS ALL INFORMATION PROVIDED PLEASE
arrow_forward
Q: Consider a Web browser that returns an outdated cached page instead of a
more recent one that had been updated at the server. Is this a failure, and if so,
what kind of failure?
arrow_forward
To describe how a Java Enterprise Edition environment's security behaviour is detailed, explain how native authentication and authorization services are deployed step-by-step when a web client seeks access to protected resources on a web server. Please use the APA style guide as a guide.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Related Questions
- For the CoinMiner malware, please write a short paragraph based on the given background and website info: CoinMiner – Trojan CoinMiner is a cryptocurrency miner family that typically uses Windows Management Instrumentation (WMI) to spread across a network. Additionally, it often uses the WMI Standard Event Consumer scripting to execute scripts for persistence. However, the malware’s capabilities may vary since there are multiple variants. CoinMiner spreads through malspam or is dropped by other malware. https://www.cisecurity.org/insights/blog/top-10-malware-december-2022 Coin Miner is a malware type that uses the hardware elements of the victim’s PC to mine cryptocurrencies. Most often, crooks who control such coin miner virus (Monero (XMR) or (Litecoin an example), as they are the easiest for mining. They can use the software that is similar or even completely repeats the one used for legit mining, but with a key difference - people whose hardware is used never agreed for this.…arrow_forward2. Configure Snort to log suspicious activity on the Untrusted and DMZ interfaces. Configure Snort to alert to the types of exploits you performed in the previous ethical hacking in VM box pfsense firewallarrow_forwardWhich of the following best describes how the logging approach called "centralized logging" is different from its counterpart approach? (A) It generates logs for changes in firewall policy. (B) It generates a log record for exceeding thresholds. C) It generates a log record for a successful or failed alteration of user access privileges. (D) It generates a log for a failed or successful modification of user credentials and access rights.arrow_forward
- Which of the following best describes how the logging approach called "local logging" is different from its counterpart approach? (A) It works in four parts: log collection, transport, storage, and analysis. B It records changes to firewall policy. It collects and aggregates logs in one central location. D It is used by systems that have a limited number of hosts.arrow_forwardMatch the MITRE ATT&CK Tactic to the Technique it falls into folowing: Which one of the below match with execution? Steal application access token Scheduled task/job Command and scripting interpreter Traffic signaling Supply chain compromise Build image on host Exportation of remote services Gather victim host informationarrow_forwardyou must provide training videos for the networking staff using Windows Server 2019. Additionally, these videos will be hosted on an Apache web server running on Ubuntu Server 20. Find a cloud service provider that will allow you to create 4 VMs: 2 of these VMs will be the two OS from scenario 1 moved to the cloud, the third VM will be running Windows Server 2019, and the fourth VM will be for the Apache web server hosting all of the videos. justifying the cost of the solution, and analyzing the security aspects (good/bad) of the solution.arrow_forward
- Match the MITRE ATT&CK Tactic to the Technique it falls into folowing: Which one of the below match with initial access? Steal application access token Scheduled task/job Command and scripting interpreter Traffic signaling Supply chain compromise Build image on host Exportation of remote services Gather victim host informationarrow_forwardWhat was the name of the non-free Linux firewall, and how would you summarise it in a few sentences?arrow_forwardFor the Gh0st malware, please write a short paragraph based on the given background and website info: Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into many sensitive computer networks. It is a cyber spying computer program. The "RAT" part of the name refers to the software's ability to operate as a "Remote Administration Tool". The GhostNet system disseminates malware to selected recipients via computer code attached to stolen emails and addresses, thereby expanding the network by allowing more computers to be infected. According to the Infowar Monitor (IWM), "GhostNet" infection causes computers to download a Trojan known as "Gh0st RAT" that allows attackers to gain complete, real-time control. Such a computer can be controlled or inspected by its hackers, and the software even has the ability to turn on the camera and audio-recording functions of an infected computer that has such capabilities, enabling monitors to see and hear…arrow_forward
- Match the MITRE ATT&CK Tactic to the Technique it falls into folowing: Which one of the below match with lateral movement? Steal application access token Scheduled task/job Command and scripting interpreter Traffic signaling Supply chain compromise Build image on host Exportation of remote services Gather victim host informationarrow_forwardQuestion 6 sm6. What is the goal of an HTTP flood attack?7. What defences are possible against a DNS amplification attack?8. What is the difference between a DDoS attack and a classic DoS attack Full explain this question and text typing work onlyarrow_forwardWhat is it about the configuration of the Ubuntu firewall that could confuse the user about its actual status?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L