Nt1310 Unit 5 Lab 3

Decent Essays
Jonathan Desmond DCN Lab 5
Kali

Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws. From that day, he eventually developed and perfected the Kali Linux distribution.

As stated previously, Kali comes bundled with a variety of features and one of the main networking analysis tools included is Wireshark. Wireshark is an open source GUI based packet analyzer with features such as the ability to live capture of packets as
…show more content…
It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system. Lastly, another key penetration tool included in Kali is sqlmap, which can automate the process of SQL injections and ultimately take over a database. Using this tool, a user can manipulate data on target’s database as well perform a variety of commands to retrieve and output

Related Documents

  • Decent Essays

    Nt1310 Lab 6.1

    • 408 Words
    • 2 Pages

    In Procedure 6.1, two different gels were used. One gel was 2.0% agarose while the other gel was 0.8% agarose. The reason we poured two gels was because each gel had a different purpose. The 2.0% agarose (thicker gel) was used to determine amplicons while the 0.8% agarose (thinner gel) was used for restriction fragments. One gel was ‘thicker’ than the other gel to distinguish smaller segments than the thinner gel.…

    • 408 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 4

    • 1249 Words
    • 5 Pages

    The first part of the experiment was determining the resolution of the DAC in volts. Before a voltage was applied the noise was determined by measuring the DC offset, the reading of the DMM at an input of zero volts. This offset was removed from the recorded values in order to provide a more accurate reading of the resolution. These corrected values and their corresponding applied voltages can be found in Table 1 of the appendix. The lowest value recorded from the DMM was -9.968V and the highest value recorded was +9.968V making the range of the DMM about 19.94±0.01V. Using the equation for calculating resolution, the resolution was calculated for values of N from 10 to 18 in increments of 2 (recorded in Table 2).…

    • 1249 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Nt1310 Lab 3.07

    • 103 Words
    • 1 Pages

    1 Specialized mats and wrist straps help protect electronic components from __________. ESD or static electricity 2 What device is used to monitor temperature in the fuser assembly in a laser printer? Thermistor 3 __________ bundle wires to help keep them organized inside electronic devices.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 4

    • 545 Words
    • 3 Pages

    IV. EXPERIMENTAL RESULTS We validated the effectiveness and the advantages of our proposed design by testing both hardware and software. We have divided the validation process in two steps: 1) validating the Microcontroller based dispensing unit and 2) Tracking patient’s adherence to the prescribed medication from the server in two ways a) tracking by central nursing stuff when used within hospital b) tracking by patient’s care taker when used within house.…

    • 545 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 468 Words
    • 2 Pages

    The purpose of this lab was to analyze and examine periodic trends of the first 36 elements that are on the periodic table. Trends that were analyzed and examined are the atomic radius (AR) and the first ionization energy (IE) of the 36 elements. The hypothesis for this lab was that the elements that are in the groups that had the highest atomic radius would be in the same groups as those who have the the highest first ionization energy and the groups who have the lowest atomic radius would be in the same groups as those elements who have the lowest first ionization energy. In order for the lab to be completed, a chart that was split into four sections was made to collect all the necessary data that is needed to make the graphs. After the data has been collected, a graph that contains both trends was made on a piece of graph paper.…

    • 468 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook (What is a Rootkit Virus?). Owners are able to implement files, monitor what’s being down on the computer and change the systems on the…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays