This lab gives us an overview of how to use software to perform a full system vulnerability check and try to fix this problems. Ans1 Investigate and discuss one of the SSL vulnerabilities found as a result of the OpenVAS scan that has a severity rating of 4 or higher. A severity rating of 4Continue reading “Lab 5 Scanning and Remediating Vulnerabilities with OpenVAS”
Category Archives: SEC602
Lab 4: Network Vulnerabilities Part 2
Ans.1 Explain in your own words the DOS attack scenario. Denial of Service attacks (DOC) is a hacker using hacking software to denies service to other users or delaying the response time of the website, server or database. Hacker try to use up the resources of the network to complete attack. For example, use up theContinue reading “Lab 4: Network Vulnerabilities Part 2”
SEC602 Lab 6: Encryption and Hashing
Ans1 Discuss the use of MD5 hashes for software downloads. MD5 is an algorithm used for producing a fixed length character to make sure the data is correct during download. MD5 is not an encryption method but it is very usefully in data transfusing. In the example of software download, no matter the size ofContinue reading “SEC602 Lab 6: Encryption and Hashing”
SEC602 Lab 3
Aim: In this lab, we are trying to perform a network footprinting and packet sniffing for discovering any useful information or of the target network. Que1. Summarise the information discovered in the Lab about the network topology. Network topology is layout of the network showing us how the nodes connecting with each other. We canContinue reading “SEC602 Lab 3”
SEC602 Lab 2
Basic explanations of the Lab To give us an idea how to setup anti-malware program under window defender and how to perform a virus scan with that, also try some features on the internet explorer to increase our pc security level. Ans 1 Discuss when you may need to use the Windows Defender feature from theContinue reading “SEC602 Lab 2”
SEC602 Lab1
Basic explanations of the Lab The aim of the lab is try to log in to the social media website, MyBook, and collect personal information form our target Phillip Nomad. And then use these information to plan an attack. Ans 1 Summaries the key information gathered from MyBook Form the front page we know thatContinue reading “SEC602 Lab1”