5.Name and briefly explain one intelligence gathering activity at each of the th
ID: 3871708 • Letter: 5
Question
5.Name and briefly explain one intelligence gathering activity at each of the three levels when finding information about a firm for penetration testing or attack.
Level 1 - Fully passive, automatic tools
Level 2 - Analysis of information gathered with automatic tools and more in-depth information
Level 3 - Active intelligence gathering.
6.Network enumeration can be a valuable tool for system administrators. Briefly describe two ways in which network enumeration can help a network administrator.
7.A company contacts you for help in peforming a sting operation using USB devices that will be distributed around the corporate campus. Company policy prohibits users from using USB drives, but the firm is certain that this policy is not followed, and wants to catch those in violation. To do so, they want you to install a piece of malware which calls home to your server, and sends a few select files to identify the individual braking policy. You are technically capable of doing this, and have some innocuous malware that will do the job.
Should you do this? Why or why not, from an ethical perspective? Justify your answer.
8. List and explain any three points of either the EC-council code of ethics or CREST code of conduct. Explain what they mean to a professional penetration tester.
You may use some points from both codes of conduct, and they do not have to be word-for-word, but must be recognizably from these codes
Explanation / Answer
5.Name and briefly explain one intelligence gathering activity at each of the three levels when finding information about a firm for penetration testing or attack.
Level 1 - Fully passive, automatic tools.
- Commonly used Automated tools for penetration testing are Metasploit, Core Impact and Immunity Canvas. They provide replicable processes that can make sure we get consistent results.
Level 2 - Analysis of information gathered with automatic tools and more in-depth information
- As we ran some automated tasks with either pre-determined or custom sets of exploits. We aggregate together the data from the results into data stores on which we can apply some intelligence to gain some insights in the forms of reports, charts and graphs etc.
Level 3 - Active intelligence gathering.
- As seen in the last stage of the Analysis phase we can actively infuse the data gathered from multi facets of the exploits run and determine the future extension of the current trends of faults in the system and possible redressals.
6.Network enumeration can be a valuable tool for system administrators. Briefly describe two ways in which network enumeration can help a network administrator.
- Network Enumeration is the process of extracting user names, machine information, network resource info, and other service info from a system. All these information is used to identify the vulnerabilities and weak points in system securities or in other way prevent them from happening.
7.A company contacts you for help in performing a sting operation using USB devices that will be distributed around the corporate campus. Company policy prohibits users from using USB drives, but the firm is certain that this policy is not followed, and wants to catch those in violation. To do so, they want you to install a piece of malware which calls home to your server, and sends a few select files to identify the individual braking policy. You are technically capable of doing this, and have some innocuous malware that will do the job.
Should you do this? Why or why not, from an ethical perspective? Justify your answer.
- As its prohibited by the company policy itself we can place the specific detection mechanisms in the company machines. But privacy concerns of the individual employee must be adhered to strictly and only targeted detection should be used.
8. List and explain any three points of either the EC-council code of ethics or CREST code of conduct. Explain what they mean to a professional penetration tester.
You may use some points from both codes of conduct, and they do not have to be word-for-word, but must be recognizably from these codes
- Explaining CREST Code of conduct:
1. Promotion of good practices:
Process is key in maintaining stringent parameters while penetration testing so that proper ways of exploits discovery and containment process is followed at all time.
2. Regulations:
Establishing the perimeter of strict and guarded process helps in bring strict regulation so that no exploits and loop holes are leaked outside of the jurisdiction into the wrong hands
3. Client Interests:
The clients which are opting for the Penetration testing are the prime stakeholders in the process and their interests are paramount within the legal jurisdiction and their privacy must be protected.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.