SI110 Homework Alpha: ________ Name: ___________________ Page... Collaboration Policy: Default ...

advertisement
SI110 Homework Alpha: ________ Name: ___________________ Page 1 of 2
Collaboration Policy: Default
MIDN Last, F.
choose one: □ None □ XS110 □ EI with:
(or more)
□ MGSP
□ Discussed with: ______________________
Homework: /SI110/Cyber Security Tools/Cyber Reconnaissance
1. [ 30 / 20 / 10 / 0 ] Read the course lesson, then answer the following. What are the three
phases of a cyber attack and what is the primary goal for each?
Phase Title
Goal of Phase
2. [ 10 / 8 / 5 / 0 ] Recall the definition of a cyber attack as an action that violates one of the five
Pillars of Cyber Security.
Scenario 1: An employee at Company X uses the 'John the Ripper' tool to crack an executive’s
computer account password. The employee finds a file there which indicates that the executive is
embezzling money. He uses this information to blackmail the executive.
Scenario 2: An employee at Company X is looking at shared documents on the company’s file
server and finds a PDF file that has text indicating that one of the executives is embezzling
money. He uses this information to blackmail the executive.
Discuss which scenario is a cyber attack, and why? (complete sentences, spelling, grammar)
3. Label each of the following activities as either Active Recon or Passive Recon.
a. [ 5 / 0 ] Doing web searches on employees of the company you’re targeting to find out
personal information about them in blogs, social media sites, news stories, etc.
b. [ 5 / 0 ] Using netcat to determine the version of webserver software being used by your
target’s public webserver.
c. [ 5 / 0 ] Running an nmap scan your target’s file server over 1000 commonly used ports to
see what other services the host is running.
d. [ 5 / 0 ] Pulling up your target’s website, viewing the source code, copying email
addresses, and checking out a few links.
SI110 Homework
Alpha: ________
Name: __________________
Page 2 of 2
4. [ 10 / 8 / 5 / 0 ] Suppose my IP Address is 57.133.88.132, and as part of my cyber recon I
give the three trace route (tracert on Windows, traceroute on UNIX) commands shown
below:
tracert
1
57.133.88.4
57.133.88.4
tracert
1
2
3
4
64.129.32.13
57.133.88.250
33.115.23.15
64.128.32.1
64.128.32.13
tracert
1
2
3
4
140.70.35.14
57.133.88.250
24.192.17.8
140.70.35.1
140.75.30.14
What is the IP address of my gateway router?
5. [ 30 / 20 / 10 / 0 ] In lab you will be performing a host scan using a tool called nmap, which is
mentioned in the notes. The nmap tool scans for live hosts and open ports, indicating which
services are running on the host. Consider the output of the nmap scan (at bottom) of
rona.academy.usna.edu. Which of the following services are running on rona? Circle all that
apply. Check out this port list for reference:
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
DNS server
web server
World of Warcraft
FTP server
NetBIOS
NFS network file share
IRC chat server
e-mail server
ssh server (ssh 'daemon')
DHCP server
secure web server
$ nmap 10.1.83.17
Starting Nmap 6.01 ( http://nmap.org ) at 2014-03-27 14:34 EDT
Nmap scan report for rona.academy.usna.edu (10.1.83.17)
Host is up (0.0034s latency).
Not shown: 990 closed ports
PORT
22/tcp
25/tcp
80/tcp
111/tcp
139/tcp
443/tcp
445/tcp
1556/tcp
2049/tcp
13782/tcp
STATE
open
open
open
open
open
open
open
open
open
open
SERVICE
ssh
smtp
http
rpcbind
netbios-ssn
https
microsoft-ds
veritas_pbx
nfs
netbackup
Download