CIS403 U2 Lab Assignment
CIS403 U2 Lab AssignmentProject description
Unit 2 Lab Assignment Report
What command would you use to determine if your machine is listening on port 443?
What effect does the use of NAT (Network Address Translation) have on the functionality of Poison Ivy?
How do you dump hashes from inside Poison Ivy?
What options must the attacker configure prior to compiling the payload?
What does the bin command do when you are running an active FTP session?
Why is it difficult to detect the PDF file being stolen if sharK is used?
How would an attacker on the Internet access a machine with a privateIP address?
In order to disguise a malware program, what type of name should it be given?
The Windows Documents and Settings folder are rarely used on which version of the operating system?
Why might you use a utility like wget instead of a standard web browser?
How might you find exploits within the Internet Explorer browser using Metasploit?
What information does an attacker located on the public (untrusted) network have access to regarding the internal (trusted) network?