Networking Hacking- Windows

In: Computers and Technology

Submitted By jessiebear932
Words 1967
Pages 8
DCOM 214 Virtual Machine Credentials | Virtual Machine Name | Credentials | Windows Server 2003 Enterprise Edition SQL | Administrator | | P@ssw0rd | BT5R3-GNOME-VM-32 Internal | root | | toor |
NOTE THAT USERNAMES, IP ADDRESSES, AND MATERIALS WILL BE DIFFERENT ON THE TEST
Setting IP Addresses
Windows Server 2003 1. Log in to the Windows 2003 machine with a username of Administrator and a password pof P@ssw0rd.

2. Click on “Start” and select “Run…”. Alternatively, double-click on the Command Prompt shortcut found on the desktop.

3. Type ncpa.cpl and hit Enter.

4. Right-click on “Local Area Connection” and select “Properties”.

5. Double-click on “Internet Protocol (TCP/IP)”.

6. Enter the following address information: IP Address | 192.168.200.200 | Subnet Mask | 255.255.255.0 | Default Gateway | 192.168.200.1 | Primary DNS Server | 192.168.200.200 |

7. Click the “OK” button twice to save the changes.

8. Open a Command Prompt and type the command ipconfig /all. The new IP address information should be displayed.

BackTrack 5r3 Internal 1. Log into the BackTrack 5r3 Internal machine with a username of root and a password of toor. The password will not be displayed as you type.

2. Type the command startx to switch from command line to GUI.

3. Open a terminal by clicking on the icon found in the toolbar at the top of the screen.

4. Type the command ifconfig eth0 192.168.200.50 netmask 255.255.255.0 up to set an IP address and subnet mask.

5. Type the command route add default gw 192.168.200.50 to set a default gateway.

Testing the Network 1. From BackTrack, type the command ping 192.168.200.200 –c 4 to ping the Windows 2003 machine four times.

2. From 2003, type the command ping 192.168.200.50 to ping BackTrack.

3. On BackTrack, type…...

Similar Documents

Hacking

...Hacking, a term where someone will be think that it is bad, not good and only think of negativity of that term. This term give several meaning to several people’s understanding and knowledge. First, hacking for computer security, and then hacking for hobbyist and last hacking for programmer subculture. There is the different meaning of hacking based on people understanding but there is also one similarity of all this three meaning, finding out weaknesses in a computer or computer network and exploiting them. The early hacker based on the internet article, wrote by Robert Trigaux, for St. Petersburg Times in 2000, this hacker is in early 1970, John Draper who hack the phone system by blowing a precise tone to ask the system to open the line for long-distance call for free. Nowadays, the internet has become the primary medium to perform business transaction and store the important data. Internet also is a primary medium for hacker to do their job. In a modern ways to make all thing easier, all the of a person can be find in internet nowadays, that make the term privacy is no more important to someone[1]. By using this medium also, a hacker can get an IP of a computer, and can breaking the computer system either to upload or download something from it. In the next paragraph will elaborate more on purpose of hacking, the effect of hacking and the way to prevent hacking. The purposes of hacking that are happen on internet or networking system in entire world today is to......

Words: 2065 - Pages: 9

Nt1330 Unit 1 Assignment Windows 2008 Networking Services

...prominently, it translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. * DHCP (Dynamic Host Configuration Protocol) * The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user from having to configure these settings manually. * RRAS (Routing and Remote Access Service) * Routing and Remote Access Service (RRAS) is a Microsoft API and server software that makes it possible to create applications to administer the routing and remote access service capabilities of the operating system, to function as a network router. Developers can also use RRAS to implement routing protocols. The RRAS server functionality follows and builds upon the Remote Access Service (RAS) in Windows NT 4.0.[1] RRAS was introduced with Windows 2000 and offered as a download for Windows NT 4.0. * Network Access Protection (NAP) * Network Access Protection (NAP) is a Microsoft technology for controlling network access of a computer host based on system health of the host. With Network Access Protection, system administrators of an organization's computer......

Words: 306 - Pages: 2

Hacking

...vulnerability assessment scan will then be performed using Nessus® to identify known software vulnerabilities. Finally, a system running a vulnerable application will be exploited using a Backtrack 4 Live CD and the Metasploit Framework application. 1. What are the five steps of a hacking attack? There are different words and phrases on which step is labeled as what. a. Reconnaissance b. Scanning c. Gaining Access d. Maintaining Access e. Covering Tracks 2. During the Reconnaissance step of the attack, describe what ZenMap GUI performs to do passive OS fingerprinting? ZenMap (Nmap) doesn’t use probes to sniff specific hosts on the network. It rather doesn’t “touch” any systems on the network. It sniffs what is going on in the network and creates a fundamental report off of that. 3. What step in the hacking attack process uses ZenMap GUI? It is used during the Reconnaissance/Scanning step. 4. What step in the hacking attack process identifies known vulnerabilities and exploits? It is used during the Reconnaissance/Scanning step. 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”? 6. Which tool and application was used to exploit the identified vulnerability on the targeted Microsoft 2003 XP......

Words: 574 - Pages: 3

Installing Windows Server Networking

...Installing Windows Server Networking Eric A. Jordan Sr. POS421 19 May, 2014 William McKee Before I explain the server roles available to install Windows Server® 2008 R2, I would like to give a brief description of Windows Server 2008 R2. Windows Server 2008 R2 is an operating system, which has a business functionality more than a consumer atmosphere. Window Server 2008 R2 has such things as self-healing NFTS, which for the most part you will not see this function running on your computer. There is also server message block, hyper v, and core packing just to name a few features and functions. There are four different main editions of Windows Server 2008 R2, which are the Standard Edition, Enterprise Edition, Datacenter Edition, and Web Edition. Choosing the correct windows edition will require the administrator or organization to understand the workload needs and requirements to ensure they choose the right operating system. Below is a list of several server roles available in installing Windows Server 2008 R2. Active Directory Certificate Services (AD CS) provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies (Microsoft, 2014). Active Directory Domain Services (AD DS) provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services (Microsoft, 2014). Active Directory Federation Services (AD FS) provides Web......

Words: 720 - Pages: 3

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are......

Words: 6103 - Pages: 25

Hacking

...Hacking: Understanding It All John Williams INF 103: Computer Literacy Thomas Hennefer June 14, 2010 Abstract As technology has grown, so has the dependence of society on its role in everyday life. Like many things, this dependence on technology comes at a risk. Hacking is the risk that members of society must face. Hackers can find any information they wish to acquire, which puts information, such as finances and personal, at great risk. In order to understand how to prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you......

Words: 2876 - Pages: 12

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft®......

Words: 659 - Pages: 3

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Product Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft® Operating Systems...

Words: 331 - Pages: 2

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Product Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft® Operating Systems...

Words: 331 - Pages: 2

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Product Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft® Operating Systems...

Words: 991 - Pages: 4

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Product Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft® Operating Systems...

Words: 1651 - Pages: 7

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft®......

Words: 2304 - Pages: 10

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Product Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft® Operating Systems...

Words: 1321 - Pages: 6

Pos 421 Complete Course Windows Server Networking

...POS 421 Complete Course Windows Server Networking Purchase here http://chosecourses.com/POS%20421/pos-421-complete-course-windows-server-networking Description POS 421 (Windows Server Networking) Week 2 Week 2 DQ 1 Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration? Week 2 DQ 2 Based on the Lombardi (2010) article, how can management tools for Microsoft Windows 7 automate user account administration? Week 2 Assignment: Active Directory Implementation Plan (500+ Words) Week 3 Week 3 DQ 1 Based on the Greiner (2010) article, how can Microsoft Windows Azure™ manage file services? Week 3 DQ 2 Based on the Kercher (2010) article, how can Windows Server 2003 manage file services? Week 3 Assignment: RiordanManufacturing Nesting Strategies (650+ Words) Week 4 Week 4 DQ 1 Based on the Barr (2010) article, Windows Azure provides a Windows-based environment for running applications and storing data on servers in Microsoft data centers. How can Azure be used as a substitute for on-premises disk management. Week 4 DQ 2 Based on the Barr (2010) article, how can the Google® model of principal cloud computing services—similar in function to Windows Azure cloud computing infrastructure—be used as a substitute for on-premises disk management? Week 4 Assignment: Comparison and Contrast Microsoft®......

Words: 1975 - Pages: 8

Hacking

...HACKING Did you know that hackers exposed 110 million Americans personal information and roughly half of the nation’s adults in the last 12 months alone. 47% of U.S. adults had their personal information exposed by hackers. In December 8 at New Hampshire the hackers are alleged to have collected the credit and debit card data from over 80,000 victims by hacking. China has highest percentage of hackers, is that 41%. Kevin Mitnick, he has the world best hacking recode and he’s known as “black hate”. In now times big multination brands or company offers prize to hack his own brand or company. For Example google offer $2.7 Million prize fund for those that can hack the chrome OS and Apple offers $1 Million. Hackers are problem because of cybercrime, cyber extortion and virus attack. Hackers are problem because of earning money through business (cybercrime) for example transection money, hack data and sell those data to some on else, hack social sites and expose personal information. Cybercrime is on the increase as new technology allows hackers to be even more anonymous and more dangerous when attacking your computer, network or site. The number, type and seriousness of cybercrime attacks have all increased. Black hat hacker claim he can make $15k to $20k an hour and also he claim like that they can hack 300 billion bits of data in second. Black hat says like that “making money by hacking is easier than brushing your teeth”. For example in 2014 international hacking rings...

Words: 677 - Pages: 3