Usetutoringspotscode to get 8% OFF on your first order!

  • time icon24/7 online - support@tutoringspots.com
  • phone icon1-316-444-1378 or 44-141-628-6690
  • login iconLogin

CIS403 U2 Lab Assignment

CIS403 U2 Lab Assignment

Project description
Unit 2 Lab Assignment Report
1.Lab 4.1
What command would you use to determine if your machine is listening on port 443?

2.Lab 4.2
What effect does the use of NAT (Network Address Translation) have on the functionality of Poison Ivy?

3.Lab 4.3
How do you dump hashes from inside Poison Ivy?

4.Lab 5.1
What options must the attacker configure prior to compiling the payload?

5.Lab 5.2
What does the bin command do when you are running an active FTP session?

6.Lab 5.3
Why is it difficult to detect the PDF file being stolen if sharK is used?

7.Lab 6.1
How would an attacker on the Internet access a machine with a privateIP address?

8.Lab 6.2
In order to disguise a malware program, what type of name should it be given?

9.Lab 6.3
The Windows Documents and Settings folder are rarely used on which version of the operating system?
10.Lab 11.1
Why might you use a utility like wget instead of a standard web browser?

11.Lab 11.2
How might you find exploits within the Internet Explorer browser using Metasploit?

12.Lab 11.3
What information does an attacker located on the public (untrusted) network have access to regarding the internal (trusted) network?

You can leave a response, or trackback from your own site.

Leave a Reply

CIS403 U2 Lab Assignment

CIS403 U2 Lab Assignment

Project description
Unit 2 Lab Assignment Report
1.Lab 4.1
What command would you use to determine if your machine is listening on port 443?

2.Lab 4.2
What effect does the use of NAT (Network Address Translation) have on the functionality of Poison Ivy?

3.Lab 4.3
How do you dump hashes from inside Poison Ivy?

4.Lab 5.1
What options must the attacker configure prior to compiling the payload?

5.Lab 5.2
What does the bin command do when you are running an active FTP session?

6.Lab 5.3
Why is it difficult to detect the PDF file being stolen if sharK is used?

7.Lab 6.1
How would an attacker on the Internet access a machine with a privateIP address?

8.Lab 6.2
In order to disguise a malware program, what type of name should it be given?

9.Lab 6.3
The Windows Documents and Settings folder are rarely used on which version of the operating system?
10.Lab 11.1
Why might you use a utility like wget instead of a standard web browser?

11.Lab 11.2
How might you find exploits within the Internet Explorer browser using Metasploit?

12.Lab 11.3
What information does an attacker located on the public (untrusted) network have access to regarding the internal (trusted) network?

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

CIS403 U2 Lab Assignment

CIS403 U2 Lab Assignment

Project description
Unit 2 Lab Assignment Report
1.Lab 4.1
What command would you use to determine if your machine is listening on port 443?

2.Lab 4.2
What effect does the use of NAT (Network Address Translation) have on the functionality of Poison Ivy?

3.Lab 4.3
How do you dump hashes from inside Poison Ivy?

4.Lab 5.1
What options must the attacker configure prior to compiling the payload?

5.Lab 5.2
What does the bin command do when you are running an active FTP session?

6.Lab 5.3
Why is it difficult to detect the PDF file being stolen if sharK is used?

7.Lab 6.1
How would an attacker on the Internet access a machine with a privateIP address?

8.Lab 6.2
In order to disguise a malware program, what type of name should it be given?

9.Lab 6.3
The Windows Documents and Settings folder are rarely used on which version of the operating system?
10.Lab 11.1
Why might you use a utility like wget instead of a standard web browser?

11.Lab 11.2
How might you find exploits within the Internet Explorer browser using Metasploit?

12.Lab 11.3
What information does an attacker located on the public (untrusted) network have access to regarding the internal (trusted) network?

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes