IT104_­EverardoMartinez_Unit6_LabAssessment

pdf

School

Purdue University *

*We aren’t endorsed by this school

Course

104

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

9

Uploaded by ChefScorpion1998

Report
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 Student: Email: Ever Martinez everardomartinez@student.purdueglobal.edu Time on Task: Progress: 5 hours, 24 minutes 100% Report Generated: Wednesday, November 29, 2023 at 12:07 AM Section 1: Hands-On Demonstration Part 1: Observe Targeted Social Engineering Research 7. Make a screen capture showing the whois information for Global Enterprises . Page 1 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 12. Make a screen capture showing LouAnne’s GetConnected profile . 15. Make a screen capture showing the first blog entry . Page 2 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 18. Make a screen capture showing the second blog entry . 22. Record the current firewall software version number . 2.7.1 Part 2: Observe a Targeted Reverse Social Engineering Attack Page 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 2. Make a screen capture showing the fake job ad . Page 4 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 Section 2: Applied Learning Part 1: Perform Targeted Social Engineering Research 2. Make a screen capture showing the services offered by Corporation Techs . 3. Make a screen capture showing the Corporation Techs corporate officers . Page 5 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 6. Review the LinkedIn profiles and answer the following questions . Which college or university did each officer attend, and for which years? Where does each officer live? Not including Corporation Techs, where did each officer work the longest? Andrew Symonds attended San Diego State University, bachelor's degree in Computer and Information services, lives in Addison Texas, and worked the longest in Wodash Incorporated. Mike Hutchins attended Virginia Tech, has a bachelor's degree in computer and information systems security, lives in Addison Texas, and has worked the longest in Crowley Corps Dee Dasher attended Texas State University, has a bachelor's degree in Computer Science, and has worked the longest in Dante's Inc Part 2: Perform a Targeted Social Engineering Attack 3. Make a screen capture showing the contents of the email. Page 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 5. Make a screen capture showing the resulting web page . Page 7 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 Section 3: Challenge and Analysis Part 1: Investigate a Data Leak 3. Make a screen capture showing the results of the Nmap scan . 15. Make a screen capture showing the script that will open the file . Page 8 of 9
Using Social Engineering Techniques to Plan an Attack (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03 19. Make a screen capture showing the result of your actions . Part 2: Continue the Investigation Write a brief summary of your recommendations. I would recommend to close the open http port(80/TCP) on the server, then securing the website by removing the keyboard shortcuts and renaming filenames or changing the filename extension. By removing what the intruder can obviously see, and therefore open with those keyboard shortcuts, the intruder will have to dig deeper on the corporationtechs website. Powered by TCPDF (www.tcpdf.org) Page 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help