Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
You Can order for custom written paper 24/7! by completig a form in 3 steps. Get those desired coursework assessment grades!
Posted: September 23rd, 2022
Penetration Test Proposal
Deliverable 3: Gaining Access Plan
Computer Sciences and Information Technology
Gaining Access
Overview
Gaining Access Phase is among the topmost significant phases of the process in regards to the potential damage that could occur (Gregg, 2006 – Write a paper; Professional research paper writing service – Best essay writers). Notably, attackers do not always need to gain access to a system for them to cause harm. One example is the denial of service attacks where resources are exhausted, or services are hindered from running on the side of the target system. For services to be halted, techniques used could involve reconfiguration and crash the system or killing off processes. The exhaustion of resources locally is done by making the outgoing communication links full (Global Knowledge, 2011).
The Gaining Access Phase entails the attacker breaking into the system/network through distinct methods or tools. The most common tools used in this phase include Cain & Abel, pwdump7, and fgdump (Hansen, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Cain & Abel is used to recover passwords especially in Microsoft Operating Systems through network sniffing, cracking the encryption on passwords through Dictionary, conducting cryptic analysis attacks, decoding of the scrambled passwords, revealing password boxes and even analyzing the routing protocols. For the pwdump7, it represents a series of Windows programs that output LM and NTLM password hashes to local user accounts through the Security Account Manager (SAM) (Hansen, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). For it to work, then one needs to be under an Administrative Account or even access one in the system for the hashes to be dumped. This tool is also considered to compromise security since a malicious administrator could use it to access users’ passwords.
After entering into the system, one is required to increase their privilege to reach the administrator level for one to install the application that will modify or hide data. The hacker looks for options that will allow them to elevate their access on the target system. Local exploits are one of the ways to utilize in a vulnerable machine for privilege escalation. Nonetheless, this cannot work every time, especially in a system that is fully updated and patched. To this effect, other options are incorporated, such as insecure file system permissions or misconfigurations, among others.
Vulnerability Resources
There are several authentic resources with documented vulnerabilities, which include databases, vendor advisories, and CIRT lists and bulletins. For databases, they contain various information on vulnerabilities such as security checklist references, software flaws related to security, misconfigurations, among others. Some of its examples include; NVD by NIST, which is a repository under the management of the United States government, and OWASP that manages vulnerabilities through the Project, OWASP Top 10. The vulnerabilities in OWASP have been classified based on attack frequency and are updated when OWASP finds it necessary. For vendor advisories, they involve information on how to deal with security vulnerabilities through the application of patches that will fix the security issues. For instance, Adobe does manage a security advisory list where security issues are discussed together with making suggestions of patches. Finally, the CIRT lists and bulletins that are groups focused on handling events which involve security breaches. For instance, the SANS CIS Critical Security Controls provides security protocols to prevent current prevalent cyber-attacks.
Techniques and Software
The cornerstone of cybersecurity and security management is password cracking which is a technique to be used in entering the system. Any information security personnel needs to understand and deploy this skill whenever necessary. The process typically involves the hacker brute-forcing their way into a system’s admin panel then bombarding the server with multiple variations for system entry. For a valid password cracking process, the process will utilize several tools. They include:
● Rainbow Crack, which is a constituent member of the hash cracker tool used in large scale time-memory trade-off methods used in cracking passwords (Roy, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The time and memory trade-off is a computation process where all the plain text and hash pairs are calculated through a particular hash algorithm. The outcome will be a rainbow table.
❖ The process does consume a lot of time, but immediately the rainbow table is running then the ability to crack passwords becomes faster compared to the brute force attacks.
❖ This tool does not need the making of tablets (rainbow) on its own since its makers have successfully generated the rainbow tables (LM), MD 5 rainbow table, NTM rainbow table, and the sha rainbow table (Roy, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online).
❖ These tables are free; thus, anyone has access to utilize them in password cracking processes. It can be used in Linux and Windows systems.
● Aircrack: this is a network hacking tool consisting of packet sniffer testers, WPA/WPA-2 PSK cracker, WEP, and 8802.22 wireless LANs analysis tool. The tool works with a wireless network interface controller in conjunction with a driver that supports raw monitoring mode and can sniff traffic in 802.11a, 802.11b 802.22g (Dalziel, 2020).
❖ It focuses on areas related to wifi security, including the monitoring of the capture packets to export the data into text files before third parties process it. Through packet injection, the tool can replay attacks, fake access points, and deauthenticate. Wifi cards and driver capabilities can also be tested through the capture, injection, and cracking of the passwords (Dalziel, 2020).
❖ the tool can also work on various platforms such as Windows, Linux, OpenBSD among others,
❖ This tool is also free, with many tutorials on its utilization found on the internet.
An important penetration tool will;l also be utilized to bypass the security levels will be Metasploit.
● Metasploit is an open cyber-security project that allows professionals to use distinct penetration testing tools in discovering remote software vulnerabilities. Additionally, it plays an essential role in being a development program for exploit modules.
❖ One of the significant projects from Metasploit was the Metasploit Framework. The Framework can develop, test, and carry out the exploits easily (Security trails Team, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Additionally, the set of security tools ingrained in the Framework can evade any detection systems, run scans for any security vulnerabilities, carry out remote attacks, and an enumeration of hosts and networks.
❖ The three different versions of this software are Pro, Community, and Framework. Pro is suitable for penetration testing and the IT security teams. Community is efficient in small organizations and infosec students (Securitytrails Team, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Finally, the Framework is ideal for app developers and security researchers.
Additionally, the use of a botnet will be used in establishing command and control communication channels. A botnet is the short form of a robot network (W3 Schools, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Through its components, the network component, the botnet becomes a command and control communication channel,
We typically deliver assignments in 3-5 days, but we often beat deadlines! Most papers arrive early, and for urgent needs, we can deliver in 1-3 hours. Larger projects like research papers or dissertations may take up to 30 days. Let us know your timeline, and we’ll make it work!
References
Dalziel, H. (2020, April 8). Password hacking tools & software. Retrieved from https://www.concise-courses.com/hacking-tools/password-crackers/
Global Knowledge. (2011). The 5 phases of hacking: Gaining access. Retrieved from https://www.globalknowledge.com/ca-en/resources/resource-library/articles/5-phases-of-hacking-gaining-access/
Gregg, M. (2006 – Write a paper; Professional research paper writing service – Best essay writers). The attacker’s process | The technical foundations of hacking | Pearson IT certification. Retrieved from https://www.pearsonitcertification.com/articles/article.aspx?p=462199&seqNum=2
Hansen, A. T. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Ethical hacking – Tools for the 5 phases of hacking | Alex Ø. T. Hansen. Retrieved from https://blog.tofte-it.dk/ethical-hacking-tools-for-the-5-phases-of-hacking/
Obbayi, L. (2020). What is vulnerability identification? Retrieved from https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/network-recon/what-is-vulnerability-identification/#gref
Roy, D. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Grey campus. Retrieved from https://www.greycampus.com/blog/information-security/what-are-the-best-password-cracking-tools
Securitytrails Team. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online, October 9). Top 15 ethical hacking tools used by Infosec professionals. Retrieved from https://securitytrails.com/blog/top-15-ethical-hacking-tools-used-by-infosec-professionals
W3 Schools. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, April 4). Botnet. Retrieved from https://www.w3schools.in/ethical-hacking/botnet/
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: