Attacking a Virtual Private Network (3e) - Fiona Mohammed

pdf

School

University of Texas, San Antonio *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

8

Uploaded by BailiffGuanacoMaster519

Report
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 Student: Email: Fiona Mohammed fiona.mohammed@my.utsa.edu Time on Task: Progress: 13 hours, 14 minutes 100% Report Generated: Sunday, October 15, 2023 at 2:53 AM Section 1: Hands-On Demonstration Part 1: Observe a Social Engineering Attack 10. Make a screen capture showing the entire travel itinerary for Marina and Rita . Page 1 of 8
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 16. Make a screen capture showing Marina’s email . Part 2: Craft a Spear Phishing Email 4. Describe your favorite scam email or an example of a scam email that you have received in the past. I work for a Title Company, and I once received an email that looked from legitimate from one of the banks we do business with. The sender was asking me to click on the link embedded in the email and make payment for delinquent invoice. What alerted me that something was wrong was the urgency of the email, and then the url of the embedded link did not match the official website of the bank. There were also a few grammatical errors that caught my attention. Everything else, including the logo looked legitimate. Page 2 of 8
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 33. Make a screen capture showing the Blocked by SPF message in the email headers . 43. Make a screen capture showing the transaction.php page in the browser . Page 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 Section 2: Applied Learning Part 1: Perform a Man-in-the-Middle Attack 5. Make a screen capture showing the RemoteWindows01 ARP table . Page 4 of 8
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 17. Make a screen capture showing the RemoteWindows01 ARP table after the ARP poisoning . Part 2: Crack a VPN Password using Captured Packets Page 5 of 8
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 12. Make a screen capture showing the cracked VPN password . Page 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 Section 3: Challenge and Analysis Part 1: Recommend Additional Spam Filtering Mechanisms Describe the role of the DKIM and DMARC in a mailing infrastructure, and how these implementations help to prevent email forgery. Use the Internet to perform your research on these mechanisms. DKIM ensures the authenticity and integrity of email messages, while DMARC helps in enforcing authentication policies and provides valuable insights through reporting, collectively enhancing the security and trustworthiness of email communications within a mailing infrastructure. These implementations help prevent email forgery by implementing digital signatures, public key verification, authentication, prevention tampering, policy enforcement, reporting, and alignment checks. By employing DKIM and DMARC, email receivers can verify the sender's authenticity and domain ownership, making it significantly harder for attackers to forge emails. If an email fails DKIM or SPF checks and the sender domain has a DMARC policy in place, the recipient's email server can take appropriate action as per the policy, such as marking the email as spam, quarantining it, or rejecting it outright. This process helps in preventing email forgery and protects recipients from phishing attacks and spoofed emails. Part 2: Enable Punycode Translation in Firefox Make a screen capture showing the enabled Display Punycode setting in Firefox . Page 7 of 8
Attacking a Virtual Private Network (3e) Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04 Part 3: Perform a Phishing Attempt to Test User Security Awareness Make a screen capture showing the email message headers in Thunderbird. Make a screen capture showing the Punycode displayed in the Firefox web browser. Powered by TCPDF (www.tcpdf.org) Page 8 of 8