Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking

ID: 3724901 • Letter: L

Question

Lab Assessment Questions & Answers

1. What are the five steps of ethical hacking?

2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?

3. What step in the hacking attack process uses Zenmap?

4. What step in the hacking attack process identifies known vulnerabilities?

5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service?

6. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtain from the owners of the system in question prior to compromising and exploiting the known vulnerability?

Explanation / Answer

1. What are the five steps of ethical hacking?

Answer:

Reconnaissance:

This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc.

Scanning:

It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts.

Gaining Access:

After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.

Maintaining Access:

Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system.

Covering Tracks:

Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files.

2)Answer:

It sends commands to the platForm-specifc Nmap executable and pipes theoutput back. ZenMap uses Profles which are basically Nmap parameterpresets to speciFy how scans are perFormed

There are several Ports, like ports: 11, 21, 22, 25, 53, 445, 3306 that are all runningTCP: The services were Linux talented, SMTP Postfix, Apache Tomcat/Coyote JSP

3)Answer:

Fingerprinting and port scanning (Reconnaissance)

4)Answer:

Vulnerabilities and exploits areidentified by enumeration, which is the most aggressive of the scanning stage

5)Answer:

During the vulnerability scan, you identified a vulnerable service in the linux victim system. The name of the vulnerable service is the telnet service. The telnet service is a command user with an underlying TCP/IP protocol for the ability to approach remote computer software. Using this server, the administrator can access an individuals' computer.

6)Answer:

Written authorization for performing intrusive penetration testing including systemcompromise and exploitation is required by any white hat hacking professional andinformation systems security consulting firm This is important because users may or maynot have adequate data back-up and recovery capabilities