Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Instructions : Using NETLAB: Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a screen shot

Instructions: Using NETLAB: Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a screen shot is your evidence). Answer the questions below in the space provided.

Showing Evidence of Completion: Your evidence of completion is a screen shot, as described in each exercise. Use the tool of your choice to take a screen shot of the required content. Screen shots should be pasted at the end of this document.

Answering Questions: Your answers should be written in carefully edited college-level English, using complete sentences.

Lab Analyze and Differentiate Types of Attacks and Mitigation Techniques

Instructions and Evidence of Completion

Answer a Question

At the end of the document (not in this table) paste a screen capture that shows the successful use of the ncrack tool to discover the password for the root account on the Ubuntu client. Paste a screen capture showing the log file analysis showing privileges being escalated to root.

Be sure to label your screen captures and be sure that it shows the command used and the output from that command. You should show two screen captures.

Question

What command would you use to stop the denyhosts service?

What command would you use to make a Secure Shell connection to the Ubuntu client machine?

What tool was used to find the password for the root account?

What type of password attack was used in this case?

Name two other password attack methods that can be used?

What file was used to contain the lists of hosts that had been denied a connection to the Ubuntu client?

What tool was used to remove the Kali machine from the list of hosts being denied by the Ubuntu client?

Explain in your own words how a DOS or DDOS attack results in a victim machine being disabled.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 17th International Conference Dasfaa 2012 Busan South Korea April 2012 Proceedings Part 1 Lncs 7238

Authors: Sang-goo Lee ,Zhiyong Peng ,Xiaofang Zhou ,Yang-Sae Moon ,Rainer Unland ,Jaesoo Yoo

2012 Edition

364229037X, 978-3642290374

Students also viewed these Databases questions