Project 1 - A Network Intrusion

pptx

School

Towson University *

*We aren’t endorsed by this school

Course

640

Subject

Computer Science

Date

Jan 9, 2024

Type

pptx

Pages

13

Uploaded by tynitajohnson

Report
Digital Forensics Technology and Practices: Project 1 - A Network Intrusion Tynita Johnson <Insert Graphic Here>
Project 1 - Introduction The purpose of Project 1 is to understand the dangers of misconfigurations that done by on a website by an administrator. Network Intrusion is unauthorized activity on a digital network. It is important for every organization to be proactive in understand network intrusion.
MARS Linux System The Linux system is Kali Linux which is a Virtual Network Computing. This system allows you to access remote from any desktop environment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
MARS Windows System Windows System using MARS on a windows server 2019. Since the server window server is in 2019 there is a better chance for the technologies to run better than most.
IIS Setup ISS is the website that was created using your IP address and your name using the FTP file. IIS supports HTTP, HTTPS, FTP, FTPS and NNTP. IIS runs on windows systems to request HTML pages or files.
Security Policy Changes According to Renders (2023), By implementing a strong password policy, your business can make it more difficult for cyber criminals to gain access to its confidential data.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Adding an Administrative Account Net user command allows to add your username to the system. Net user local group is used to manage usernames added to the system.
Base64 Lesson Cyber Chef allows to create a code using Base 64.
Website Misconfiguration
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
dirb attack on the Windows Server
Credentials Extracted According to Optics (2023), Some critical misconfigurations allow attackers to access servers remotely and disable network and information security controls such as firewalls and VPNs. Unused open administration ports also expose the application to remote attacks.
Summary Tools that were used were Mate Terminal, Internet Services , and command prompts. During the using the tool like IIS it allowed the hacker to get into hidden folder because the password was saved. The attacker was able to carry out their activities by mocking the website administrator .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Optics, R. (2023). Retrieved from https://reciprocity.com/blog/security-misconfigurations- how-to-avoid-them/ Renders, J. (2023). Retrieved from https://brightlineit.com/why-implementing-a-strong- password-policy-is-important-for-your-businesss-data/#:~:text=By%20implementing%20a %20strong%20password,gain%20access%20to%20sensitive%20information.