Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A hacker attacks a network in different ways, using common protocols and applica

ID: 3667085 • Letter: A

Question

A hacker attacks a network in different ways, using common protocols and applications. A proxy server can protect the identity of your system from a hacker, but if a hacker connects to the proxy server, your identity would be disclosed.

Based on what you have learned so far, answer the following questions:

Explain at least three different protocols or applications a hacker may use to assist in an attack on a network.

In what possible ways can these protocols be used to attack a network?

Discuss the easiest and safest way to intrude into a network. Provide rationale to support your answer.

Discuss the features of two popular proxy servers. Explain which feature makes one proxy server provide more protection over the other and why.

Describe a scenario in which you would use a particular proxy server to protect the identity of your system. Justify your choice.

Explanation / Answer

1)
Some of the protocols/tools used to hack network are
using tool ping, using tracert tool, Vulnerability Scanning.
-----------------------------------------------------------------------------------------------
2)
Using ping, they will convert address to domain in windows and DNS protocol reveals domain name which
matches. By typing "ping <IP Address>" attacker can logged into respective site.

Using Tracert, we can get the system information while sending packets to destination.
By typing "tracert <destination address> ", we can get the data related to that destination address.

Vulnerability scanning are because of programming errors.
=-----------------------------------------------------------------------------------------------
3)
Earliest and safest one is using ping tool. Since it doesnt require much commands, more
procedure. It will how much data and at what speed data is flowing we can easily known.
--------------------------------------------------------------------------------------------
4)
One of the proxy is
tomatoproxy.eu
----------------
Rating: 83
Anonymity Level: High anonymity
Average Access Time: 0.9 sec.
Life time: 98 %
First Test: 07/26/2015
Added: 07/18/2015
Country: Netherlands

---------------------------------------
charlieproxy.ml

Rating: 90
Anonymity Level: High anonymity
Average Access Time: 0.3 sec.
Life time: 100 %
First Test: 01/26/2016
Added: 01/17/2016
Country: United States

Features:
SSL accesss : NO
Browse SSL Encrypted Pages Yes
--------------------------------------------------------------------------------------------------------------------
5)
Across globe more number of people use proxy servers. They will use VPN in form of VPN's .
VPN is proxy helps to connects and make ability to work securely and remotely. Proxy servers simply encapsulates
our data and identity and give extra layer of security while sending and recieving data.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote