JNTU Ethical Hacking and Penetration Testing Guide Questions

User Generated

ngpbbcre61

Computer Science

Jawaharlal Nehru Technological University

Description

Hello , Pls answer below 3 question in a separate WORD DOc

Course: Ethical Hacking

A. In 500 words, Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example: Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) use APA format and add 3 clickable reference link at the end.

B .Visit the "whois" website ( https://www.whois.com/whois/). Find out who owns the site, who manages the site, the site creation date, the registry expiry date, and where they are located (what country) for each of the following sites:

1) New England College (www.nec.edu)

2) Google

3) Bank of America, Bank of India, or Your bank

4) Apple.com

--------------------------------------------------------------------------------

Course : Information Assurance

1) Describe some ways that an administrator can harden a system on a network.
An initial post must be between 250-300 words ,use APA format and add 3 clickable reference link at end

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello find the attached

Running head: ETHICAL HACKING

1

Ethical hacking
Name
Institution

2
ETHICAL HACKING
Ethical hacking
Answer Question A
Many information security professionals aim to become certified ethical hackers.
Ethical hacking, can also be referred to as penetration testing or pen testing. It is the legal
breaking into computers and devices to test an organization's defenses. Security professionals
find this very exciting. They get paid just to keep up with the latest technology and get to
break into computers without the fear that they will face arrests.
Ethical hackers are engaged by companies and organizations to identify vulnerabilities
in their systems from the penetration tester's point of view to make sure there is no downside.
If they are able to hack in past the current defenses, the software developer is given the
chance to close the hole before an outside attacker discovers the loophole (Baloch, 2017). In
case they find none, their employers get the impression that their systems are secure enough
that even paid hackers couldn’t break into them.
In ethical hacking, enumeration is the first phase. At this phase, enumeration can
gather information on Passwords policies lists, network shares, SNMP data (if not properly
secured), IP tables, and usernames of different systems. For this purpose, there is a variety of
tools that are widely used for Enum...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags