Showing Page:
1/16
Sign up to view the full document!
lock_open Sign Up
Showing Page:
2/16
Sign up to view the full document!
lock_open Sign Up
Showing Page:
3/16
Sign up to view the full document!
lock_open Sign Up
Showing Page:
4/16
Sign up to view the full document!
lock_open Sign Up
End of Preview - Want to read all 16 pages?
Access Now
Unformatted Attachment Preview
Digital ForensicsTechnology andPractices:Project 2 – TheHacker AttacksNameCST 640 9040: Digital ForensicsTechnology and PracticesProfessorDate(Computer Forensics, n.d.)Project 2 - Introduction•Attackers’ point of view discovering the web administrator’slogin credentials• The attacker discovers a web vulnerability, determines a way togain access, then creates as many methods as possible tomaintain access.In our Last Episode - Credentials Extracted•The attacker discovered a hidden directory in the website structure storing hiddencredentials.• The credentials were encrypted with Base64 by the web administrator anddecrypted by the attacker for use to log into the system.Base64 DecodeThe attacker will Nmap for more information• Conduct a no ping Nmap to remain undiscovered of the remote host• Open port 22 – SSH• Open port 3389 - RDPSSH into the Windows Victim• Access acquired• Attack MethodsAdd an Administrative Account• Create a persistent account•Assign the newly created account to the administrators groupStop A Service• Stop the “Windows Time” service• Ramifications of stopped“Windows Time” serviceCreating a Scheduled Task (Backdoor)• The SCHTASKS command line utility• An attacker would schedule a regularly running maliciously intended taskAdding a Batch File to Startup•Maintaining a malicious presence in a host by ensuring the program continuallyruns.Stealing Data? ...
Purchase document to see full attachment
Tags: UMGC CST640 cybersecurity project 2 project2 the hacker attacks grade A
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4
24/7 Study Help
Stuck on a study question? Our verified tutors can answer all questions, from basicmathto advanced rocket science!
Post question
Most Popular Study Documents
1 page
Application software application packages Are programs designed to help users achieve a specific task. ● Word processors- used for typing documents eg letters..th ... Application software application packages Are programs designed to help users achieve a specific task. ● Word processors- used for typing documents eg letters..they include:1 page
4 infografia educacion para la salud health education La Educación para la Salud, como herramienta de la Promoción de la Salud, tendrá que ocuparse además de crear 4 infografia educacion para la salud health education La Educación para la Salud, como herramienta de la Promoción de la Salud, tendrá que ocuparse además de crear7 pages
Advertising Techniques and Contributions Types Discussion Advertising Techniques and Contributions Types Discussion7 pages
HOMELESS IN THE UNITED STATES California has the highest population of homeless people in the US, 21% of the nation’s homeless population. Worse ... HOMELESS IN THE UNITED STATES California has the highest population of homeless people in the US, 21% of the nation’s homeless population. Worse still, 63.7% of the homeless in ...View more