What Are The Five Steps Of The Hacking Process

Improved Essays
1. List the five (5) steps of the Hacking Process.
a. Foot-printing, Enumeration, System Hacking, Covering Tracks, Planting Backdoors
2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?
a. Foot-printing can be done as an initial first step to acquire as much information as possible on the victim’s system.
3. What applications and tools can be used to perform this initial reconnaissance and probing step?
a. To perform the initial reconnaissance and probing step, you can examine a companies’ website, identify their key employees, and figure out which technologies and software the company may be using. Spiderfoot is an example of a foot-printing application that can be used.
4. How can social engineering be used to gather information or data about the organization’s IT infrastructure?
a. Social engineering can be used to gather information or data about the organization’s IT infrastructure by vocally pretending to be someone they aren’t, like a system admin, to obtain information of the network. While pretending they are someone else they may watch you login to gain access to your credentials.
…show more content…
The NIST publication 800-42 describes penetration and security testing.
10. According to the NIST document, what are the four phases of penetration testing?
a. The four phases of a penetration test are Planning, Discovery, Attack, and Reporting.
11. Why would an organization want to conduct an internal penetration test?
a. An organization would want to conduct an internal penetration test to get a better understanding of their network from an outsider, and to make sure that their internal system is strong and secure.
12. What constitutes a situation in which a penetration tester should not compromise or access a system as part of a controlled penetration test?
a. A penetration tester should not compromise a system that is performing a backup, that is migrating or one that may be under attack.
13. Why would an organization hire an outside consulting firm to perform an intrusive penetration test without the IT department’s knowledge?
a. An organization would hire an outside consulting firm to perform an intrusive penetration test without IT department’s knowledge to get a better understanding of their network from an outsiders point of view, and to make sure their IT department is doing their job properly to protect the organizations

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    2.4.11 Independent testing: KIU should have a testing plan that identifies control objectives; schedules tests of the controls used to meet those objectives; ensures prompt corrective action where deficiencies are identified; and provides independent assurance for compliance with security policies. Security tests are necessary to identify control deficiencies. An effective testing plan identifies the key controls, then tests those controls at a frequency based on the risk that the control is not functioning. Security testing should include independent tests conducted by personnel without direct responsibility for security administration. Adverse test results indicate a control is not functioning and cannot be relied upon.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Betty Boyd Case Summary

    • 1292 Words
    • 6 Pages

    The murders of Betty Boyd, Verline Boyd, and Evangela Boyd in 1993 were tragic and heartbreaking. The man accused of the murders, Sherwood Brown, caused the police to chase him and ending up making himself seem even more guilty (Sherwood, 1997). He was convicted of the murders and sentenced to two life sentences and the death penalty. After many attempts made by Brown for DNA testing during his time in prison, the Mississippi Supreme Court granted the testing in 2012 and found he may not be the killer everyone thought him to be (Sherwood, 1997).…

    • 1292 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    During the investigation is where the reader can learn about the investigation process and how you Obtain a search warrant and what you can search while you are you doing a…

    • 1457 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As one who has been an external consultant in the past, experience would say that internal consultant 's would be able to make a better impact on a company then external consultants. An internal consultant may have limited perceptions and may be a part of the company already. They may add a different approach to how something is done because they have seen it done in the past and have applied the techniques themselves. They are also expected to have an in-depth knowledge on what the company needs to better its position in their industry. They are hired at a lesser rate than outside consultants.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Mr. Oliver sent the three photos to a single person whom he deems trustworthy enough to not exploit the photos. Task 2) Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Hizmete Özel / Confidential Hizmete Özel / Confidential MGMT 512: Corporate Governance Sultan Orman: 0055134 Corporate Failure: Toshiba Accounting Scandal (2015) Summary of the Case: Everything began with the results of an independent report created by a committee of people consisting of independent accountants and lawyers in July 2015. The CEO of one of the leading companies in electronics and technology sector, Toshiba from Japan, announced that he is resigning of his position due to mis-reporting –over-reporting – the profits of the company for the last seven years (between 2008 and 2014).…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Article of the Week Two Workplace spying has occurred for over a century. In the Industrial Revolution, factory workers were timed through stopwatches, while today, employees are monitored through technology. For instance, many companies can legally surveil employees’ internet use, track emails, and even log keystrokes to determine their work rate. Some companies can also identify a worker’s exact location, driving speed, and conversation length.…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The first thing I would do in processing the crime scene is interview the first officer that arrived at the crime scene to establish a theory of the case. Second I would examine the crime scene to see if the theory of the case is substantiated by what I observed. During this time I would start identifying possible items of evidence, identifying entry and exit points and getting a general outline of the homicide scene. Third, I would take some pictures. Photographing the scene would allow me to record a pictorial view of what the scene looked like undisturbed and to record items that is possible evidence.…

    • 918 Words
    • 4 Pages
    Improved Essays

Related Topics