In: Computer Science
RESEARCH REPORT
-How could you prevent an attacker with Aircrack from getting into your Wi-Fi?
-What is the recommended way to mitigate telnet risk?
-What information can you see when someone uses SSH?
-How do you create a hidden file in Linux?
-What is the /etc/shadow file?
-Explain what each part of this command does: sudo tcpdump tcp -i eth1 -s 0 -C 50 -w Cap.txt
-During SFTP what version of cryptographic key exchange was used?
(1).How could you prevent an attacker with Aircrack from getting into your Wi-Fi?
ANSWER: there are 5 methods
–password cracking
SOLUTION: better password
-social engineering attack
SOLUTION:always be suspecious
-WPS pin attack
SOLUTION:disable wps and verify with testing
-REMOTE-ACCESS ATTACK
SOLUTION:disable remote access and pord forwading
-Rouge access point
SOLUTION:Spot sign of a rouge AP
(2).What is the recommended way to mitigate telnet risk?
Make sure you secure your network feom telnet_based attack by creating a first line of defence
where the network cannot be fully trusted. the use of telnet over the public internet should be avoided due to the risk of the eavesdropping
(3).What information can you see when someone uses SSH?
the information of who logged in when is available in/var/log or other logged files on other distributions. there are multiple log monitering programs that can extract the information you configure as a relevant.on any sane system every user authentication is logged
(4).How do you create a hidden file in Linux?
.right click the file you want to hide
.then select rename
.make the file hiden by placing the period at the beginning of the file name
(5).What is the /etc/shadow file?
the file stores encrypted passwords. the files are seperated by colons and include: user name
(6).During SFTP what version of cryptographic key exchange was used?
Jscape key