ISSC456_Week5_Case_Study_Ocasio_Miguel
doc
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
456
Subject
Business
Date
Feb 20, 2024
Type
doc
Pages
5
Uploaded by ocasio703
ISSC456
Week 5 Case Study
Name: _______Miguel Ocasio__________________
Date: ______2/4/2024_______
Fill in your name above, put your full response below each question, save the file using the file naming convention: “
ISSC456_Week5_Case_Study_LastName_FirstName.doc
” where LastName is your last name and FirstName is your first name, then return this document for grading.
Assignment Rubric ( 100 Points)
Synthesis of Concepts
50
Fulfilled Assignment Requirements
25
Writing Standards - APA format
15
Timeliness
10
Explore the password attack tools in Kali Linux http://tools.kali.org/tools-listing
.
Select five tools and explore how to use each one
Prepare a one-paragraph summary detailing how to use each of the tools selected
ISSC456
Week 5 Case Study
Week 5 Case Study
Miguel Ocasio
American Military University
ISSC456 B001 Winter 2024
Dr. Lo'ai Tawalbeh
February 2
nd
2024
ISSC456
Week 5 Case Study
Nmap
- The Nmap tool in Kali Linux is essential for penetration testing and network reconnaissance. The Nmap tool lets security professionals and ethical hackers discover hosts, services, and vulnerabilities on a network. In addition to port scanning, version detection, and OS fingerprinting, it can perform various types of scans, giving you a comprehensive picture of the target environment. Nmap helps security practitioners assess a network's security posture, identify open ports, and uncover cyber threats. Users can automate and customize scans with its scripting engine, NSE (Nmap Scripting Engine). In ethical hacking, Nmap
is a fundamental tool for mapping networks, understanding their configurations, and securing them from cyberattacks.
Dnswalk - In Kali Linux, the dnswalk tool facilitates the examination and enumeration of DNS (Domain Name System) information within a target environment during network security assessments and penetration tests. DNS converts human-readable domain names into IP addresses. By walking through DNS hierarchies, querying domain name servers, and collecting information about a domain, DNSwalk automates the process. Security professionals and ethical hackers can use this tool to identify DNS vulnerabilities, misconfigurations, and unauthorized entries. With dnswalk, you can map all DNS records of a target to uncover potential points of entry for attackers or areas where
security improvements need to be made, ultimately enhancing overall network security.
Hashcat - The hashcat tool in Kali Linux is essential for password cracking and hash analysis in cybersecurity. It uses brute-force, dictionary, and hybrid attacks to crack hashed passwords. With its ability to utilize the parallel processing capabilities of modern GPUs, it's fast and suitable for large-scale password cracking operations. Security professionals and penetration testers use hashcat to assess password strength and identify authentication system vulnerabilities. By cracking hashed passwords, hashcat shows the susceptibility of weak or easily
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ISSC456
Week 5 Case Study
guessable passwords, emphasizing the importance of strong password policies and
improving overall cybersecurity.
Crunch
- Kali Linux's crunch tool is essential for password security testing and cryptography. With crunch, security professionals, ethical hackers, and penetration testers can make highly customized password lists based on criteria like length, character sets, and patterns. Especially useful for brute-force attacks, dictionary attacks, or password strength assessments on systems, networks, or encrypted files. By tailoring password lists to specific requirements, crunch makes
password cracking more efficient and helps assess systems' resilience to various password threats. Due to its versatility and flexibility, it helps identify and mitigate vulnerabilities associated with weak or easily guessable passwords in cybersecurity assessments.
Gobuster - In penetration testing and ethical hacking scenarios, gobuster in Kali Linux provides a powerful way to brute-force directory and file names on web applications. This tool systematically discovers hidden or unprotected paths, directories, and files on a web server. Gobuster works by launching a series of requests, trying to access various endpoints with different wordlists, and analyzing responses. The process helps security professionals identify potential vulnerabilities, sensitive areas, or exposed resources in a web application, contributing to a thorough security assessment. Gobuster helps ethical hackers uncover potential entry points that malicious actors might exploit, enabling proactive measures to improve web application defenses.
ISSC456
Week 5 Case Study
References:
Crunch: Kali linux tools. Kali Linux. (2022a, November 16). https://www.kali.org/tools/crunch/ Dnswalk: Kali linux tools. Kali Linux. (2022b, November 16). https://www.kali.org/tools/dnswalk/ Gobuster: Kali linux tools. Kali Linux. (2023a, August 17). https://www.kali.org/tools/gobuster/ Hashcat: Kali linux tools. Kali Linux. (2022c, November 16). https://www.kali.org/tools/hashcat/ Nmap: Kali linux tools. Kali Linux. (2023b, November 20). https://www.kali.org/tools/nmap/
Related Documents
Recommended textbooks for you

Practical Management Science
Operations Management
ISBN:9781337406659
Author:WINSTON, Wayne L.
Publisher:Cengage,
Recommended textbooks for you
- Practical Management ScienceOperations ManagementISBN:9781337406659Author:WINSTON, Wayne L.Publisher:Cengage,

Practical Management Science
Operations Management
ISBN:9781337406659
Author:WINSTON, Wayne L.
Publisher:Cengage,