IT Discussion Thoughts

Apr 26th, 2015
Price: $15 USD

Question description

Can you please help me with writing a reply to each question below? Write your personal thoughts for each statement:


I personally do not know of a way to “hack” a firewall but I do know that via port scanning you can determine what ports the FW has open and or what its clients respond on. Then you may use these ports as a method of entry.

With regard to IP/DS bypass, that’s easy. An IP/DS can stop what it can’t “see” so if you encrypt the data (SSH, secure VPN, SFTP) then you can bypass an IP/DS easily. There are several free tools you can also use to encrypt files and send via email for example (like 7zip or WinRar) as these will bypass an IP/DS but may be blocked by email policy.

Obfuscation of files (mixing up the code to make it not easy to be read by a human) can also be used to bypass devices as some IP/DSs may be tooled to only look for certain values inside of a file and obfuscation may be used to make these values seem not present.

A search for FW scanners will reveal several tools like nmap and others. A search for SSH and encrypted sessions should show that as long as the malware is programed to “talk” over 443 or 8443 then it has a high chance of IP/DS bypass. When searching for obfuscation, pay close attention to “Java obfuscation” and malware “kits” like “Zeus”, “blackhole” or “SweetOrange” though BE WARNED: click at your own risk as some of these will return live (infected) sites.

Kits >>

Zeus (live sublinks)

Sweet Orange

BlackHole "creator"


My home router, the Belkin N600, doesn't appear to have any security vulnerabilities specific to it, by my research. Other Belkin routers had an issue where a buffer overflow could be caused to get into the router. This vulnerability, however, has been fixed in a later firmware update, which my router is up to date on.  In addition, the router shipped without any admin password at all. It takes only a password, no username, to log in to the router, so the first thing I did was change the password. Other steps that can be taken to secure a device are turning off the 'guest network' that some come with, setting the router to not broadcast itself, and setting the network security to WPA2 with a sufficiently long and complex password. 

Tutor Answer

(Top Tutor) Daniel C.
School: UT Austin

Studypool has helped 1,244,100 students

Review from our student for this Answer

Apr 28th, 2015
"all I can say is wow very fast work, great work thanks"
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1820 tutors are online

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors