preview

Nt1310 Unit 7 Physical Security Attack

Decent Essays

As I am to evaluate these attacks methods each one I will give a rating out of 5. 5 being really good and effective for purpose, 1 being useless, time consuming and non-effective.
A physical attack all hackers learn is lock picking, the physical security of building can be the pinnacle difference between the attacks being successful or not, if we require access to the building to construct an attack, lock picking is the key. As you can see from Appendix V- XI I have shown two successful locking picking attempts one is a brute force style method with a combination lock the other is using a tensioner and pick set. Both methods are time consuming and may not always work the first time, I feel as though the method to use a pick and tensioner is …show more content…

Hydra is programme that may not always work the first time this could be because of the security in place or the network or the fact you don’t have the relevant information to gain access. Upon my lab test Hydra worked fine, twice, I gave the username of the device I wished to gain access too, alternatively you can have a list to run it from use switches such as –L then the directory of the file. This I how I did the password part as I did not know the password of the device but used a default password list, and the password was on that list, other things you have to identify are the remote Access protocols and the IP address, Hydra doesn’t require you to be on the network but in doing so makes it far easier to work with. I feel Hydra is an effective password cracking tool as we can change many variables about the attack to get the information we require. See Appendix XIII. Hydra gets a rating of 3/5 but this is because if the wrong ethical hacker is using it, it would take a long time to figure out and require a lot of password …show more content…

When planning an attack we need make sure that all sections have been looked at from every possibility in Banka Mentior Fakea Notreala’s case it has been easy to show how vulnerable we are in places like the internet, the misconception of incorrect staff training and the poor use of the equipment. For a long term solution having regular ethical hacking test done on the network will influence the shaping of the security and the threats out

Get Access