ISSC363 Week3 Forum
ISSC363 Week3 Forum
Popular in Course
verified elite notetaker
Popular in Department
This 0 page Study Guide was uploaded by kimwood Notetaker on Monday November 9, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 19 views.
Reviews for ISSC363 Week3 Forum
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
1What software applications or quottoolsquot would you use The software I would use is Kali Linux formerly known as BackTrack Kali Linux is an open source set of penetration testing tools that are used by both blackhat and whitehat hackers to discover and exploit vulnerabilities in hardware and software One of the tools that is provided in the release that I used almost on a daily basis is called metasploit Metasploit is used in penetration testing to both identify and evaluate vulnerabilities Another tool that I use on a regular basis is a password cracking tool called john the ripper The tool allows the user to run dictionary attacks or custom lists and works with encrypted passwords using several different hash types Tools that are provided within Kali Linux that are used in security assessments are Identifying live hosts dnmap Information gathering Jigsaw sslcaudit Voip honey Crawlers Apacheusers Vulnerability Assessment DotDothn The release is a full blown penetration and exploitation toolkit that is used by professionals all over the world 2What platform Operating System would you use From personal experience I believe that Linux is the best operating system for conducting security assessments Kali Linux formerly BackTrack is based on Ubuntu Linux One of the benefits of using Linux as the operating system for a penetration testing distribution is that the software is open source The communities that use it are able to change the source code in order to make the OS perform what they need Unlike Windows Linux is fully customizable testers are able to tailor it to the tasks they are to perform before the assessment 3How does this toolkit differ from that you would use for an application security assessment wireless security assessment You can list other types of related assessments if you know if how you might adjust for the given scenario The toolkit does not really differ from what I would use when conducting an assessment Kali Linux is what I would use to conduct an application security assessment and a wireless security assessment There are tools built into the release that the admin can use to conduct these assessments for instance while conducting a wireless security assessment I would use a tool like Airman to identify networks and Fern to break into the Network Your answer should include the terms concepts and theories learned thus far Cite each source used No credit will be given if Wikipedia is used Your answer should be a minimum of 250 words To post click on the Topic title e g Week 3 Forum to access the topic and then click the quotPost New Threadquot button
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'