Friday, June 14, 2019

Ethical Hacking Essay Example | Topics and Well Written Essays - 500 words - 3

Ethical Hacking - Essay ExampleIt can be used to protect an organization against an attack because it spots by and potentially prevents intrusions that breach the brasss firewalls or those that occur behind the local area entanglement (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking.IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds ill-advised positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is not recognised by the IDS (IATAC, 2009, p.4). When this happens, hackers footprinting efforts can enter the system and evade the systematic monitors of an IDS. Also, an IDS cannot evade successful social engineering tactics. These tactics gathers useful information about the system that can be used to determine vulnerabilities and other useful information.Two scanning and enumeration tools that the organization can use are Port see and Null Session tools. Port scanning can be done by Nmap- it is a program made for network mapping tool. Nmap does different network functions, such as fingerprinting a system, finding ports that are common to a specific network device, and determining the servers, such as recognizing that System B is actually a Solaris server. The realisedows Server Message Block (SMB) protocol provides free information. Null Sessions are not on by default in Win XP, Server 2003, Vista, and Windows 7 but open in Win 2000 and NT. Some of the Null Session Tools are Dumpsec, Winfo, Sid2User, and NBTenun 3.3.Scanning and enumeration can be interpreted to the next level through using vulnerability assessment tools that respond to scanning and enumeration activities. Vulnerability

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.