Order For Custom Writing, Similar Answers & Assignment Help Services

Fill the order form details in 3 easy steps - paper's instructions guide.

Posted: June 15th, 2022

Penetration Test Proposal

Penetration Test Proposal
Deliverable 3: Gaining Access Plan

Computer Sciences and Information Technology

Gaining Access
Overview
Gaining Access Phase is among the topmost significant phases of the process in regards to the potential damage that could occur (Gregg, 2006). Notably, attackers do not always need to gain access to a system for them to cause harm. One example is the denial of service attacks where resources are exhausted, or services are hindered from running on the side of the target system. For services to be halted, techniques used could involve reconfiguration and crash the system or killing off processes. The exhaustion of resources locally is done by making the outgoing communication links full (Global Knowledge, 2011).
The Gaining Access Phase entails the attacker breaking into the system/network through distinct methods or tools. The most common tools used in this phase include Cain & Abel, pwdump7, and fgdump (Hansen, 2018). Cain & Abel is used to recover passwords especially in Microsoft Operating Systems through network sniffing, cracking the encryption on passwords through Dictionary, conducting cryptic analysis attacks, decoding of the scrambled passwords, revealing password boxes and even analyzing the routing protocols. For the pwdump7, it represents a series of Windows programs that output LM and NTLM password hashes to local user accounts through the Security Account Manager (SAM) (Hansen, 2018). For it to work, then one needs to be under an Administrative Account or even access one in the system for the hashes to be dumped. This tool is also considered to compromise security since a malicious administrator could use it to access users’ passwords.
After entering into the system, one is required to increase their privilege to reach the administrator level for one to install the application that will modify or hide data. The hacker looks for options that will allow them to elevate their access on the target system. Local exploits are one of the ways to utilize in a vulnerable machine for privilege escalation. Nonetheless, this cannot work every time, especially in a system that is fully updated and patched. To this effect, other options are incorporated, such as insecure file system permissions or misconfigurations, among others.
Vulnerability Resources
There are several authentic resources with documented vulnerabilities, which include databases, vendor advisories, and CIRT lists and bulletins. For databases, they contain various information on vulnerabilities such as security checklist references, software flaws related to security, misconfigurations, among others. Some of its examples include; NVD by NIST, which is a repository under the management of the United States government, and OWASP that manages vulnerabilities through the Project, OWASP Top 10. The vulnerabilities in OWASP have been classified based on attack frequency and are updated when OWASP finds it necessary. For vendor advisories, they involve information on how to deal with security vulnerabilities through the application of patches that will fix the security issues. For instance, Adobe does manage a security advisory list where security issues are discussed together with making suggestions of patches. Finally, the CIRT lists and bulletins that are groups focused on handling events which involve security breaches. For instance, the SANS CIS Critical Security Controls provides security protocols to prevent current prevalent cyber-attacks.
Techniques and Software
The cornerstone of cybersecurity and security management is password cracking which is a technique to be used in entering the system. Any information security personnel needs to understand and deploy this skill whenever necessary. The process typically involves the hacker brute-forcing their way into a system’s admin panel then bombarding the server with multiple variations for system entry. For a valid password cracking process, the process will utilize several tools. They include:
● Rainbow Crack, which is a constituent member of the hash cracker tool used in large scale time-memory trade-off methods used in cracking passwords (Roy, 2018). The time and memory trade-off is a computation process where all the plain text and hash pairs are calculated through a particular hash algorithm. The outcome will be a rainbow table.
❖ The process does consume a lot of time, but immediately the rainbow table is running then the ability to crack passwords becomes faster compared to the brute force attacks.
❖ This tool does not need the making of tablets (rainbow) on its own since its makers have successfully generated the rainbow tables (LM), MD 5 rainbow table, NTM rainbow table, and the sha rainbow table (Roy, 2018).
❖ These tables are free; thus, anyone has access to utilize them in password cracking processes. It can be used in Linux and Windows systems.
● Aircrack: this is a network hacking tool consisting of packet sniffer testers, WPA/WPA-2 PSK cracker, WEP, and 8802.22 wireless LANs analysis tool. The tool works with a wireless network interface controller in conjunction with a driver that supports raw monitoring mode and can sniff traffic in 802.11a, 802.11b 802.22g (Dalziel, 2020).
❖ It focuses on areas related to wifi security, including the monitoring of the capture packets to export the data into text files before third parties process it. Through packet injection, the tool can replay attacks, fake access points, and deauthenticate. Wifi cards and driver capabilities can also be tested through the capture, injection, and cracking of the passwords (Dalziel, 2020).
❖ the tool can also work on various platforms such as Windows, Linux, OpenBSD among others,
❖ This tool is also free, with many tutorials on its utilization found on the internet.
An important penetration tool will;l also be utilized to bypass the security levels will be Metasploit.
● Metasploit is an open cyber-security project that allows professionals to use distinct penetration testing tools in discovering remote software vulnerabilities. Additionally, it plays an essential role in being a development program for exploit modules.
❖ One of the significant projects from Metasploit was the Metasploit Framework. The Framework can develop, test, and carry out the exploits easily (Security trails Team, 2018). Additionally, the set of security tools ingrained in the Framework can evade any detection systems, run scans for any security vulnerabilities, carry out remote attacks, and an enumeration of hosts and networks.
❖ The three different versions of this software are Pro, Community, and Framework. Pro is suitable for penetration testing and the IT security teams. Community is efficient in small organizations and infosec students (Securitytrails Team, 2018). Finally, the Framework is ideal for app developers and security researchers.
Additionally, the use of a botnet will be used in establishing command and control communication channels. A botnet is the short form of a robot network (W3 Schools, 2019). Through its components, the network component, the botnet becomes a command and control communication channel,

References
Dalziel, H. (2020, April 8). Password hacking tools & software. Retrieved from https://www.concise-courses.com/hacking-tools/password-crackers/
Global Knowledge. (2011). The 5 phases of hacking: Gaining access. Retrieved from https://www.globalknowledge.com/ca-en/resources/resource-library/articles/5-phases-of-hacking-gaining-access/
Gregg, M. (2006). The attacker’s process | The technical foundations of hacking | Pearson IT certification. Retrieved from https://www.pearsonitcertification.com/articles/article.aspx?p=462199&seqNum=2
Hansen, A. T. (2018). Ethical hacking – Tools for the 5 phases of hacking | Alex Ø. T. Hansen. Retrieved from https://blog.tofte-it.dk/ethical-hacking-tools-for-the-5-phases-of-hacking/
Obbayi, L. (2020). What is vulnerability identification? Retrieved from https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/network-recon/what-is-vulnerability-identification/#gref
Roy, D. (2018). Grey campus. Retrieved from https://www.greycampus.com/blog/information-security/what-are-the-best-password-cracking-tools
Securitytrails Team. (2018, October 9). Top 15 ethical hacking tools used by Infosec professionals. Retrieved from https://securitytrails.com/blog/top-15-ethical-hacking-tools-used-by-infosec-professionals
W3 Schools. (2019, April 4). Botnet. Retrieved from https://www.w3schools.in/ethical-hacking/botnet/

Order | Check Discount

Tags: best custom paper writing service, best nursing paper writing service, best nursing writing service, best paper writing services, help writing papers for college

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing.StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00