Defending IT Systems

Anonymous
timer Asked: Dec 21st, 2017
account_balance_wallet $30

Question description

As preparation, read the following:

https://joshua14.homelinux.org/blog/?p=1392

In a written analysis of the above commands and processes, discuss how you might defeat the firewall of a school or organization and describe how you would accomplish this from both inside and outside of the organization. Include any recommendations to the school or organization to improve its defense. Why is this knowledge important to the ethical hacker?

the paper must be 2 pages in length, not including the title and references pages, and must cite at least two scholarly resources other than the course materials. It must follow academic writing standards and APA style guidelines, as appropriate.

It is strongly encouraged that you submit the paper to the Turnitin Originality Check prior to submitting it and match rate must not exceed than 15%.

The solid introduction and conclusion is highly important.

Tutor Answer

henryprofessor
School: Rice University

Attached.

Running head: DEFENDING IT SYSTEMS

1

Defending IT Systems
Name
Institution

DEFENDING IT SYSTEMS

2
Defending IT Systems

How I might defeat the firewall of a school or organization
I might defeat the firewall of a school or that of an organization through building a simple
Secure Shell or the SSH protocol tunnel to bypass some firewall restrictions. The SSH tunneling
enables an external access to the school or organization firewall with Port 3306 not allowed on
either computer. Using this command [ssh [USER]@mylocalserver -L 3306:127.0.0.1:3306 -N]
The “-L” switch command instructs the SSH to listen on the local computer host (127.0.0.1) on
port 3306. The second colon points to the port to forward the port to the home server, a similar
port to that of port 3306) (Use Simple SSH Tunnelling Techniques To Defeat Restrictive
Firewalls Part 1, 2012)).
After I enter this command, I get greeted with a timely request for my normal SSH user
password. Once I input this, I will be logged in, and the Secure Shell or the SSH gets ready to
forward the requests. By pressing CTRL-Z, this inputs the SSH process that runs in the
background. This then will stop the process for a while and then will return to me the command
prompt. By restarting the process in which it behaves like a background process, I would use the
command prompt: [bg] which then outputs [[1] + ssh myusername@mylocalserver.net -L
3306:127.0.0.1:3306 -N &]. This would instantiate a process to bypass the wall.
How I would accomplish the defeat from both inside and outside of the organization
I would accomplish this from both in and outside the organization by installing a JAP
software on the computer and then make rigorous attempts to bypass the proxy servers. If the
company or I have a have a proxy firewall within, the process then will work. Alternatively, then
I can get ophcrack software or the Cain & Abel which contains an APR (Arp Poison Routing); a
feature that enables sniffing on the switched or blocked Local Area Networks and allowed

DEFENDING IT SYSTEMS

3

sniffing and analysis of encrypted protocols like the SSH-1 (Repik, 2008). The firewall breaker
contains some filters to capture the hidden ...

flag Report DMCA
Review

Anonymous
Outstanding Job!!!!

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors