IT104_EverardoMartinez_Unit6_LabAssessment
pdf
keyboard_arrow_up
School
Purdue University *
*We aren’t endorsed by this school
Course
104
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
9
Uploaded by ChefScorpion1998
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
Student:
Email:
Ever Martinez
everardomartinez@student.purdueglobal.edu
Time on Task:
Progress:
5 hours, 24 minutes
100%
Report Generated:
Wednesday, November 29, 2023 at 12:07 AM
Section 1: Hands-On Demonstration
Part 1: Observe Targeted Social Engineering Research
7.
Make a screen capture
showing the whois information for Global Enterprises
.
Page 1 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
12.
Make a screen capture
showing LouAnne’s GetConnected profile
.
15.
Make a screen capture
showing the first blog entry
.
Page 2 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
18.
Make a screen capture
showing the second blog entry
.
22.
Record
the current firewall software version number
.
2.7.1
Part 2: Observe a Targeted Reverse Social Engineering Attack
Page 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
2.
Make a screen capture
showing the fake job ad
.
Page 4 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
Section 2: Applied Learning
Part 1: Perform Targeted Social Engineering Research
2.
Make a screen capture
showing the services offered by Corporation Techs
.
3.
Make a screen capture
showing the Corporation Techs corporate officers
.
Page 5 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
6.
Review
the LinkedIn profiles
and answer the following questions
.
Which college or university did each officer attend, and for which years?
Where does each officer live?
Not including Corporation Techs, where did each officer work the longest?
Andrew Symonds attended San Diego State University, bachelor's degree in Computer and
Information services, lives in Addison Texas, and worked the longest in Wodash Incorporated.
Mike Hutchins attended Virginia Tech, has a bachelor's degree in computer and information systems
security, lives in Addison Texas, and has worked the longest in Crowley Corps
Dee Dasher attended Texas State University, has a bachelor's degree in Computer Science, and has
worked the longest in Dante's Inc
Part 2: Perform a Targeted Social Engineering Attack
3.
Make a screen capture
showing the contents of the email.
Page 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
5.
Make a screen capture
showing the resulting web page
.
Page 7 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
Section 3: Challenge and Analysis
Part 1: Investigate a Data Leak
3.
Make a screen capture
showing the results of the Nmap scan
.
15.
Make a screen capture
showing the
script that will open the file
.
Page 8 of 9
Using Social Engineering Techniques to Plan an Attack (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 03
19.
Make a screen capture
showing the
result of your actions
.
Part 2: Continue the Investigation
Write a brief summary
of your recommendations.
I would recommend to close the open http port(80/TCP) on the server, then securing the website by
removing the keyboard shortcuts and renaming filenames or changing the filename extension. By
removing what the intruder can obviously see, and therefore open with those keyboard shortcuts, the
intruder will have to dig deeper on the corporationtechs website.
Powered by TCPDF (www.tcpdf.org)
Page 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help