Question

In: Computer Science

RESEARCH REPORT -How could you prevent an attacker with Aircrack from getting into your Wi-Fi? -What...

RESEARCH REPORT

-How could you prevent an attacker with Aircrack from getting into your Wi-Fi?

-What is the recommended way to mitigate telnet risk?

-What information can you see when someone uses SSH?

-How do you create a hidden file in Linux?

-What is the /etc/shadow file?

-Explain what each part of this command does: sudo tcpdump tcp -i eth1 -s 0 -C 50 -w Cap.txt

-During SFTP what version of cryptographic key exchange was used?

Solutions

Expert Solution

(1).How could you prevent an attacker with Aircrack from getting into your Wi-Fi?

ANSWER: there are 5 methods

–password cracking

SOLUTION: better password

-social engineering attack

SOLUTION:always be suspecious

-WPS pin attack

SOLUTION:disable wps and verify with testing

-REMOTE-ACCESS ATTACK

SOLUTION:disable remote access and pord forwading

-Rouge access point

SOLUTION:Spot sign of a rouge AP

(2).What is the recommended way to mitigate telnet risk?

Make sure you secure your network feom telnet_based attack by creating a first line of defence

where the network cannot be fully trusted. the use of telnet over the public internet should be avoided due to the risk of the eavesdropping

(3).What information can you see when someone uses SSH?

the information of who logged in when is available in/var/log or other logged files on other distributions. there are multiple log monitering programs that can extract the information you configure as a relevant.on any sane system every user authentication is logged

(4).How do you create a hidden file in Linux?

.right click the file you want to hide

.then select rename

.make the file hiden by placing the period at the beginning of the file name

(5).What is the /etc/shadow file?

the file stores encrypted passwords. the files are seperated by colons and include: user name

(6).During SFTP what version of cryptographic key exchange was used?

Jscape key

  


Related Solutions

You have been using your phone and your school's Wi-Fi network to access hosts on the...
You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.
What is the function of Bluetooth, Wi-fi, Satellite methods of technology and which is appropriate for...
What is the function of Bluetooth, Wi-fi, Satellite methods of technology and which is appropriate for what function? Course: Information Technology for the Health Professions
10. Give an example of how the problem of adverse selection might prevent you from getting...
10. Give an example of how the problem of adverse selection might prevent you from getting financing for something you want to do. Can you think of a way of overcoming this problem?
Describe how social research could aid in the passage of laws or potentially prevent the enacment...
Describe how social research could aid in the passage of laws or potentially prevent the enacment of poor laws. Mention at least 4 of the following major concepts: Scientific method, Hypothesis, Random sample, Hawthorne effect, Dependent and Independent variable, Experimental and Control group, Qualitative and Quantitative research, Reliability and validity, Mean, median, mode, correlation, causal, logic, and code of ethics.
Wi-Fi RF Linearization can you explain this topic in a simple way to make me understand...
Wi-Fi RF Linearization can you explain this topic in a simple way to make me understand it ?
How could government prevent banks from failing due to insolvency and illiquidity?
How could government prevent banks from failing due to insolvency and illiquidity?
107) How does an equity research report differ from what you might see in a hedge...
107) How does an equity research report differ from what you might see in a hedge fund or asset management stock pitch? a) Equity research analysts tend to forecast a “target stock price” instead of giving a wide range of possible intrinsic values for the company. b) There is often significantly more industry data in equity research reports, especially in initiating coverage reports. c) While hedge fund stock pitches could be either “long” or “short” recommendations, equity research reports only...
what four skin functions that could stop a person from getting a critical burn, how does...
what four skin functions that could stop a person from getting a critical burn, how does that burn stop that function from occurring
How can you prevent ovulation? How can you prevent spermatogenesis? How does oogenesis differ from spermatogenesis?...
How can you prevent ovulation? How can you prevent spermatogenesis? How does oogenesis differ from spermatogenesis? What are nurse cells? What causes the release of LH and FSH?
Explain how the stomach secretes acid at a cellular level. How could you prevent the excessive...
Explain how the stomach secretes acid at a cellular level. How could you prevent the excessive acid production that triggers heartburn? What is protecting the walls of the stomach against acid?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT