Thursday, July 2, 2020

Computer sciences and Information Technology Networking - 275 Words

Computer sciences and Information Technology: Networking (Coursework Sample) Content: Studentà ¢Ã¢â€š ¬s Name:Tutorà ¢Ã¢â€š ¬s Name:Course:Date Due:Computer sciences and Information technology:Question oneWhat search string would you use with Google to locate a Web server that was offering up a directory listing of the /etc directory, including the password file?[Directory String] + (inurl:)[file type] + [limitors]Question twoYou are analyzing network traffic and you see the stringÂdXNlcjpwYXNzd29yZA==Âin a Web request where the client is authenticating with the server. The username from this request isÂÂand the password is.Question threeBefore you embark on a penetration test, what is the very first thing you want to get?Reconnaissance- I should first identify publicly accessible services from the home network such as web servers or emails.Question fourWhat type of scan are you running if you use the following? Nmap à ¢Ã¢â€š ¬sS 192.168.0.0/2?Port Scanning by ping sweeping using NmapQuestion fiveWhat tool would you use to get passwo rds on a voice over IP network?ÂVoiPongQuestion sixYou find the following in Web logs.ÂPOST/scripts/postit. php?p=%3Ealert (document. Cookie ())%3C%2Fscript%3E. What is going on?It shows the URL is encoded using a custom scheme by the web and the javaScript is not isolated in the URL parameter.Short essay answer:Question sevenIs a vulnerability scanner completely accurate and reliable? Why or why not?NO. Because vulnerability scanner will only identify the possible vulnerabilities based on other network responses that are not what they seem.Question eightYou see someone using the command "ncÂÂ80". What is it they are trying to do?They are trying to test a transmission control protocol connection to a remote host () on port 80.Question nineExplain clearly, in your own words, what a buffer overflow is.Buffer overflow is a software bug that happens when sequence of instructions coded to a physical memory storage are overstored than intended.Question tenYou are periodi cally running vulnerability scans on your Web server. One day it indicates to you that Firefox has a security vulnerability that could allow for a privilege escalation. How concerned are you about this finding? Include your reasoning.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.