Defending IT Systems

timer Asked: Dec 21st, 2017
account_balance_wallet $30

Question description

As preparation, read the following:

In a written analysis of the above commands and processes, discuss how you might defeat the firewall of a school or organization and describe how you would accomplish this from both inside and outside of the organization. Include any recommendations to the school or organization to improve its defense. Why is this knowledge important to the ethical hacker?

the paper must be 2 pages in length, not including the title and references pages, and must cite at least two scholarly resources other than the course materials. It must follow academic writing standards and APA style guidelines, as appropriate.

It is strongly encouraged that you submit the paper to the Turnitin Originality Check prior to submitting it and match rate must not exceed than 15%.

The solid introduction and conclusion is highly important.

Tutor Answer

School: Rice University




Defending IT Systems


Defending IT Systems

How I might defeat the firewall of a school or organization
I might defeat the firewall of a school or that of an organization through building a simple
Secure Shell or the SSH protocol tunnel to bypass some firewall restrictions. The SSH tunneling
enables an external access to the school or organization firewall with Port 3306 not allowed on
either computer. Using this command [ssh [USER]@mylocalserver -L 3306: -N]
The “-L” switch command instructs the SSH to listen on the local computer host ( on
port 3306. The second colon points to the port to forward the port to the home server, a similar
port to that of port 3306) (Use Simple SSH Tunnelling Techniques To Defeat Restrictive
Firewalls Part 1, 2012)).
After I enter this command, I get greeted with a timely request for my normal SSH user
password. Once I input this, I will be logged in, and the Secure Shell or the SSH gets ready to
forward the requests. By pressing CTRL-Z, this inputs the SSH process that runs in the
background. This then will stop the process for a while and then will return to me the command
prompt. By restarting the process in which it behaves like a background process, I would use the
command prompt: [bg] which then outputs [[1] + ssh -L
3306: -N &]. This would instantiate a process to bypass the wall.
How I would accomplish the defeat from both inside and outside of the organization
I would accomplish this from both in and outside the organization by installing a JAP
software on the computer and then make rigorous attempts to bypass the proxy servers. If the
company or I have a have a proxy firewall within, the process then will work. Alternatively, then
I can get ophcrack software or the Cain & Abel which contains an APR (Arp Poison Routing); a
feature that enables sniffing on the switched or blocked Local Area Networks and allowed



sniffing and analysis of encrypted protocols like the SSH-1 (Repik, 2008). The firewall breaker
contains some filters to capture the hidden ...

flag Report DMCA

Outstanding Job!!!!

Similar Questions
Hot Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors