Beer Yaakov Talmudic Seminary Gaining Access Process Test Proposal Paper

User Generated

Zbaxrl123

Computer Science

Beer Yaakov Talmudic Seminary

Description


Centralia Security Lab has been hired by Haverbrook Investment Group to perform penetration testing on its systems. As a pen tester, you have been assigned to write the plan for what Centralia will do in the testing.


Instructions

After collecting enough information about the target you will describe how to use that information to gain access to Haverbrook's systems. Your one- to two-page plan on gaining access should include:

  • details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalate the account privileges to administrative levels, to perform a protected operation.
  • an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.

As you are developing the Gaining Access Plan, keep these questions in mind:

  • How would you escalate your privileges?
  • How would you establish a command and control communication channel?


USE TEMPLAYE BELOW

Unformatted Attachment Preview

Penetration Test Proposal Deliverable 3: Gaining Access Plan Name: Course Number and Section: Instructor: Date: Gaining Access Overview Provide a summary of the Gaining Access phase. Vulnerable Resources Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD. Techniques and Software Provide the techniques and any software, applications, or scripts that will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information. References
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Penetration Test Proposal
Deliverable 3: Gaining Access Plan
Name:
Course Number and Section:
Instructor:
Date:

Gaining Access

Overview
Provide a summary of the Gaining Access phase.
Gaining access phase is the most vital step of any attack. This importance is in terms of assessing
potential damage. However, hackers do not need to access a system to inflict damage. For example,
denial of service can either stop the system from functioning or exhaust system resources. Using a
logical bomb, killing processes, or crashing or reconfiguring a system can lead the service to stop
running. System resources can also get exhausted locally but overworking outgoing communication
channels.
Exploiting a system can occur offline, locally, over the web or local area network as theft or
deception. Attacks include distributed denial of service attac...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags