IT374_Unit_3_Assignment.docx(1) IT374 Unit 3 Assignment Purdue Global University IT374 Linux Port scanning is a method of determining which ports on a network are open and could be receiving or sending data. It
...
IT374_Unit_3_Assignment.docx(1) IT374 Unit 3 Assignment Purdue Global University IT374 Linux Port scanning is a method of determining which ports on a network are open and could be receiving or sending data. It is also a process for sending packets to specific ports on a host and analyzing responses to identify vulnerabilities. This scanning process cant take place without identifying a list of active hosts and mapping those hosts to their IP addresses. After a thorough network scan is complete and a host list is compiled, a proper port scan can take place. The organization of IP addresses, hosts, and ports allows the scanner to properly identify open or vulnerable server locations with the goal of diagnosing security levels. Metasploit is a free tool for penetration testing networks and systems. There are many different tools within Metasploit that can be used by ethical hackers to attempt to find vulnerabilities within systems. Some of these tools include password sniffing, windows patch enumeration, and SMB login check. These tools help a user find vulnerabilities within the system that can allow them access. These tools operate in different ways, some are passive scans while others are active scans or exploits. Metasploit allows the user to run a password sniffling module that can sniff passwords. The module used is psnuffle. Psnuffle allows the user to sniff POP3, IMAP, FTP, and HTTP GET passwords from the wire (Password Sniffing, 2020). Within the settings, the user can change. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
[Show More]