Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Put yourself in the shoes of an attacker for a moment. Do you believe you would

ID: 3728307 • Letter: P

Question

Put yourself in the shoes of an attacker for a moment. Do you believe you would be following a methodology like the OSSTMM or the Pentesting Execution Standard? Would you use a more rudimentary identify, scan, enumerate, attack methodology? Would you use no methodology at all other than blindly launching attacks in hopes of having something stick? Explain your decision and consider what sort of attacker might use which approach if there is a difference. Provide at least 2 resources to support your response

Explanation / Answer

The attackers can be classified as –

(a) Ethical hacker (a certified hacker who uses penetration testing techniques),

(b) Joyriders (attacker is doing it for amusement),

(c) Accidental attacker (network administrator),

(d) Spies (want to steal information to sell it later),

(e) Destructors (want to ruin computer systems, delete data), etc.

Being an attacker, one would like to try all the possible methodologies or no methodology at all. But, the choice depends on the type of attacker.

Different methodologies can be used by the attacker depending on the type of attacker.