Conduct research and cite supporting sources in APA format where appropriate.
- Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.”
- Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
- Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
- What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
- Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
- Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
- Which algorithm was used to hash the password?
- What is the maximum number of days the password is valid?
- What is the date that this account will expire?