Defending IT Systems

User Generated

fnyru117

Computer Science

Description

As preparation, read the following:

https://joshua14.homelinux.org/blog/?p=1392

In a written analysis of the above commands and processes, discuss how you might defeat the firewall of a school or organization and describe how you would accomplish this from both inside and outside of the organization. Include any recommendations to the school or organization to improve its defense. Why is this knowledge important to the ethical hacker?

the paper must be 2 pages in length, not including the title and references pages, and must cite at least two scholarly resources other than the course materials. It must follow academic writing standards and APA style guidelines, as appropriate.

It is strongly encouraged that you submit the paper to the Turnitin Originality Check prior to submitting it and match rate must not exceed than 15%.

The solid introduction and conclusion is highly important.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DEFENDING IT SYSTEMS

1

Defending IT Systems
Name
Institution

DEFENDING IT SYSTEMS

2
Defending IT Systems

How I might defeat the firewall of a school or organization
I might defeat the firewall of a school or that of an organization through building a simple
Secure Shell or the SSH protocol tunnel to bypass some firewall restrictions. The SSH tunneling
enables an external access to the school or organization firewall with Port 3306 not allowed on
either computer. Using this command [ssh [USER]@mylocalserver -L 3306:127.0.0.1:3306 -N]
The “-L” switch command instructs the SSH to listen on the local computer host (127.0.0.1) on
port 3306. The second colon points to the port to forward the port to the home server, a similar
port to that of port 3306) (Use Simple SSH Tunnelling Techniques To Defeat Restrictive
Firewalls Part 1, 2012)).
After I enter this command, I get greeted with a timely request for my normal SSH user
password. Once I input this, I will be logged in, and the Secure Shell or the SSH gets ready to
forward the requests. By pressing CTRL-Z, this inputs the SSH process that runs in the
background. This then will stop the process for a while and then will return to me the command
prompt. By restarting the process in which it behaves like a background process, I would use the
command prompt: [bg] which then outputs [[1] + ssh myusername@mylocalserver.net -L
3306:127.0.0.1:3306 -N &]. This would instantiate a process to bypass the wall.
How I would accomplish the defeat from both inside and outside of the organization
I would accomplish this from both in and outside the organization by installing a JAP
software on the computer and then make rigorous attempts to bypass the proxy servers. If the
company or I have a have a proxy firewall within, the process then will work. Alternatively, then
I can get ophcrack software or the Cain & Abel which contains an APR (Arp Poison Routing); a
feature that enables sniffing on the switched or blocked Local Area Networks and allowed

DEFENDING IT SYSTEMS

3

sniffing and analysis of encrypted protocols like the SSH-1 (Repik, 2008). The firewall breaker
contains some filters to capture the hidden ...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags