IT Discussion Thoughts

Apr 26th, 2015
SoccerBoss
Category:
Writing
Price: $15 USD

Question description

Can you please help me with writing a reply to each question below? Write your personal thoughts for each statement:

1.)

I personally do not know of a way to “hack” a firewall but I do know that via port scanning you can determine what ports the FW has open and or what its clients respond on. Then you may use these ports as a method of entry.

With regard to IP/DS bypass, that’s easy. An IP/DS can stop what it can’t “see” so if you encrypt the data (SSH, secure VPN, SFTP) then you can bypass an IP/DS easily. There are several free tools you can also use to encrypt files and send via email for example (like 7zip or WinRar) as these will bypass an IP/DS but may be blocked by email policy.

Obfuscation of files (mixing up the code to make it not easy to be read by a human) can also be used to bypass devices as some IP/DSs may be tooled to only look for certain values inside of a file and obfuscation may be used to make these values seem not present.

A search for FW scanners will reveal several tools like nmap and others. A search for SSH and encrypted sessions should show that as long as the malware is programed to “talk” over 443 or 8443 then it has a high chance of IP/DS bypass. When searching for obfuscation, pay close attention to “Java obfuscation” and malware “kits” like “Zeus”, “blackhole” or “SweetOrange” though BE WARNED: click at your own risk as some of these will return live (infected) sites.

Kits >>

Zeus (live sublinks)

Sweet Orange

BlackHole "creator"

2.)

My home router, the Belkin N600, doesn't appear to have any security vulnerabilities specific to it, by my research. Other Belkin routers had an issue where a buffer overflow could be caused to get into the router. This vulnerability, however, has been fixed in a later firmware update, which my router is up to date on.  In addition, the router shipped without any admin password at all. It takes only a password, no username, to log in to the router, so the first thing I did was change the password. Other steps that can be taken to secure a device are turning off the 'guest network' that some come with, setting the router to not broadcast itself, and setting the network security to WPA2 with a sufficiently long and complex password. 


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UT Austin
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
tinytim47
Dec 3rd, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
Five Star Tutor
Nov 22nd, 2016
" Outstanding Job!!!! "
mixedballz
Nov 19th, 2016
" excellent work as always thanks for the help "
lilmoe415
Nov 10th, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
darnay
Oct 28th, 2016
" The best tutor out there!!!! "
dontuwannaknow
Oct 19th, 2016
" Excellent work as always thanks so much "
SjSurvivor143
Oct 5th, 2016
" Thanks for the help. "
Joemoe
Sep 22nd, 2016
" <3 it, thanks for saving me time. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1828 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors