Ask Computer Engineering Expert

"1. Penetration Testing 
a. What are 9 hacking steps of the hacking methodology discussed in "Hacking exposed" by McClure et al? 

b. How the nmap detects the OS version of the machine scanned? 

c. How the scanning tools evades the IDS detection? Mention two techniques. 

d. fpipe can be used to setup backdoor connections and to avoid blocking by the firewall. 
Assume a site has a DMZ LAN set up similar to our homework#4 with 128.198.61.39 for DNS server and 128.198.61.40 for web server, and that an attacker has infected two of the machines, one in DMZ LAN and one in intranet. 
The attacker has executed a command "fpipe -l 53 -s 53 -r 80 10.0.0.51" on one of the infected machines. Note that the options for the fpipe are: 
-l Specifies the FPipe listening server port number. 
This is the port number that listens for connections on the FPipe machine. 
-r Specifies the remote port number. 
This is the port number on the remote machine that will be connected to.
-s Specifies the outbound connection local source port number. 
This is the port number that data sent from the FPipe server machine will come from when sent to the remote machine.

10.0.0.51 the remote host IP.
1. What machines are infected? Indicate their IP addresses. 

2. From Internet, what IP address and port number will the attacker use to connect to the infected intranet machine of this site? 

3. If the attacker can gain the intranet access with this fpipe, which firewall is not set up right? 

4. What firewall rule (iptables command) will protect such intranet access? I would like to have a generic rule and just protect against 10.0.0.51. 
 
5. The service that got infected is critical to the site. Why the site can still operate and the system admin did not detect right away, besides being lazy in checking the logs? Give one reason. 

6. Assume the attacker only hijacks the process but not the executable of this service, how can the system admin detect this backdoor? 

7. How do you improve the fpipe to avoid such a detection?

8. The process goes away when system reboot. How can the hacker do to make sure the modified fpipe runs after system reboot?

e. In the above case, a command, "nc -v -L -e cmd.exe -p 80 -s 10.0.0.51" was used by the attacker to set up a backdoor connection. 
1. How can this backdoor be used by the attacker? Give two scenarios. 

2. How can Network-based IDS be used to detect such an attack? 

3. How can Host-based IDS be used to detect such an attack?

f. It is against a company's security policy to by-pass the company's firewalls and establish direct connection between an intranet node and Internet, and between an intranet node and a DMZ server. How can a security officer detect that an employee has set up a backdoor dialup server using his office phone/cellphone and his office desktop? Briefly discuss tools the security office can use for this case. 

g. What is metepreter contained in Metasploit Framework software? How you use it? 

h. The nmap -sV -v 128.198.60.156 show the following result:
[cs591@viva ~]$ nmap -sV -v 128.198.60.156

Starting Nmap 4.03 ( http://www.insecure.org/nmap/ ) at 2007-05-10 13:12 MDT
Machine 128.198.60.156 MIGHT actually be listening on probe port 80
DNS resolution of 1 IPs took 0.00s. Mode: Async [#: 3, OK: 1, NX: 0, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect() Scan against csvm1.uccs.edu (128.198.60.156) [1674 ports] at 13:12
Discovered open port 443/tcp on 128.198.60.156
Discovered open port 25/tcp on 128.198.60.156
Discovered open port 80/tcp on 128.198.60.156
Discovered open port 445/tcp on 128.198.60.156
Discovered open port 1025/tcp on 128.198.60.156
Discovered open port 1027/tcp on 128.198.60.156
Discovered open port 139/tcp on 128.198.60.156
Discovered open port 135/tcp on 128.198.60.156
Discovered open port 5000/tcp on 128.198.60.156
The Connect() Scan took 1.11s to scan 1674 total ports.
Initiating service scan against 9 services on csvm1.uccs.edu (128.198.60.156) at 13:12
The service scan took 6.16s to scan 9 services on 1 host.
Host csvm1.uccs.edu (128.198.60.156) appears to be up ... good.
Interesting ports on csvm1.uccs.edu (128.198.60.156):
(The 1665 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE VERSION
25/tcp open smtp Microsoft ESMTP 6.0.2600.1
80/tcp open http Microsoft IIS webserver 5.1
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
443/tcp open https?
445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
1025/tcp open msrpc Microsoft Windows RPC
1027/tcp open msrpc Microsoft Windows RPC
5000/tcp open upnp Microsoft Windows UPnP
Service Info: OS: Windows

Nmap finished: 1 IP address (1 host up) scanned in 7.407 seconds

1. What exploits will you try? List the three names of the exploits you may be able to use with Backtrack. 

2. What payload will you use? Brief explain why. 

3. Some of the payload has a version with name "reverse" which let the victim initiates the connection instead of the attacker's machine. Give a scenario where you want to use the "reverse" version of the payload. 

2. Firewall 
a. How MASQUERADE is used? Is this service only dealing with outbound packets (to Internet)? 

b. How DNAT is used? Is it applied in PREROUTING or POSTROUTING? 

c. A web site uses cgi-scripts on a DMZ web server to process the purchasing/credit card information filled by the customer. The purchasing/credit card information is then transferred back to the intranet database server for processing. 
1. How can it protect the credit card info before the data is transferred back to the intranet database for processing. 

2. Since the security policy of the inner firewall prohibits the DMZ web server from initiating a connection to the intranet, how will you set up the data transfer of the purchasing/credit card info? 

3. IDS 
a. How can zero-day worm be detected? Briefly discuss one technique. 

b. If a hacker changes the content of the TFN DDoS attack msg from "1234" to "blast", what will be the new snort rule to be added? 

c. The above scenario indicates the problem with IDS detection based on specific patterns. If the attacker changes the content, the existing rules will produce false negatives. What is your solution to this? 

d. What are the rule optons in SNORT that can improve the efficiency of the intrusion detection process? List two. Briefly discuss why.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9650007

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As