ISSC456_Week5_Case_Study_Ocasio_Miguel

doc

School

American Military University *

*We aren’t endorsed by this school

Course

456

Subject

Business

Date

Feb 20, 2024

Type

doc

Pages

5

Uploaded by ocasio703

Report
ISSC456 Week 5 Case Study Name: _______Miguel Ocasio__________________ Date: ______2/4/2024_______ Fill in your name above, put your full response below each question, save the file using the file naming convention: ISSC456_Week5_Case_Study_LastName_FirstName.doc ” where LastName is your last name and FirstName is your first name, then return this document for grading. Assignment Rubric ( 100 Points) Synthesis of Concepts 50 Fulfilled Assignment Requirements 25 Writing Standards - APA format 15 Timeliness 10 Explore the password attack tools in Kali Linux http://tools.kali.org/tools-listing . Select five tools and explore how to use each one Prepare a one-paragraph summary detailing how to use each of the tools selected
ISSC456 Week 5 Case Study Week 5 Case Study Miguel Ocasio American Military University ISSC456 B001 Winter 2024 Dr. Lo'ai Tawalbeh February 2 nd 2024
ISSC456 Week 5 Case Study Nmap - The Nmap tool in Kali Linux is essential for penetration testing and network reconnaissance. The Nmap tool lets security professionals and ethical hackers discover hosts, services, and vulnerabilities on a network. In addition to port scanning, version detection, and OS fingerprinting, it can perform various types of scans, giving you a comprehensive picture of the target environment. Nmap helps security practitioners assess a network's security posture, identify open ports, and uncover cyber threats. Users can automate and customize scans with its scripting engine, NSE (Nmap Scripting Engine). In ethical hacking, Nmap is a fundamental tool for mapping networks, understanding their configurations, and securing them from cyberattacks. Dnswalk - In Kali Linux, the dnswalk tool facilitates the examination and enumeration of DNS (Domain Name System) information within a target environment during network security assessments and penetration tests. DNS converts human-readable domain names into IP addresses. By walking through DNS hierarchies, querying domain name servers, and collecting information about a domain, DNSwalk automates the process. Security professionals and ethical hackers can use this tool to identify DNS vulnerabilities, misconfigurations, and unauthorized entries. With dnswalk, you can map all DNS records of a target to uncover potential points of entry for attackers or areas where security improvements need to be made, ultimately enhancing overall network security. Hashcat - The hashcat tool in Kali Linux is essential for password cracking and hash analysis in cybersecurity. It uses brute-force, dictionary, and hybrid attacks to crack hashed passwords. With its ability to utilize the parallel processing capabilities of modern GPUs, it's fast and suitable for large-scale password cracking operations. Security professionals and penetration testers use hashcat to assess password strength and identify authentication system vulnerabilities. By cracking hashed passwords, hashcat shows the susceptibility of weak or easily
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ISSC456 Week 5 Case Study guessable passwords, emphasizing the importance of strong password policies and improving overall cybersecurity. Crunch - Kali Linux's crunch tool is essential for password security testing and cryptography. With crunch, security professionals, ethical hackers, and penetration testers can make highly customized password lists based on criteria like length, character sets, and patterns. Especially useful for brute-force attacks, dictionary attacks, or password strength assessments on systems, networks, or encrypted files. By tailoring password lists to specific requirements, crunch makes password cracking more efficient and helps assess systems' resilience to various password threats. Due to its versatility and flexibility, it helps identify and mitigate vulnerabilities associated with weak or easily guessable passwords in cybersecurity assessments. Gobuster - In penetration testing and ethical hacking scenarios, gobuster in Kali Linux provides a powerful way to brute-force directory and file names on web applications. This tool systematically discovers hidden or unprotected paths, directories, and files on a web server. Gobuster works by launching a series of requests, trying to access various endpoints with different wordlists, and analyzing responses. The process helps security professionals identify potential vulnerabilities, sensitive areas, or exposed resources in a web application, contributing to a thorough security assessment. Gobuster helps ethical hackers uncover potential entry points that malicious actors might exploit, enabling proactive measures to improve web application defenses.
ISSC456 Week 5 Case Study References: Crunch: Kali linux tools. Kali Linux. (2022a, November 16). https://www.kali.org/tools/crunch/ Dnswalk: Kali linux tools. Kali Linux. (2022b, November 16). https://www.kali.org/tools/dnswalk/ Gobuster: Kali linux tools. Kali Linux. (2023a, August 17). https://www.kali.org/tools/gobuster/ Hashcat: Kali linux tools. Kali Linux. (2022c, November 16). https://www.kali.org/tools/hashcat/ Nmap: Kali linux tools. Kali Linux. (2023b, November 20). https://www.kali.org/tools/nmap/