Difference between revisions of "User:Scott/27"
Jump to navigation
Jump to search
Line 13: | Line 13: | ||
__TOC__ | __TOC__ | ||
− | =Cracker Objectives= | + | ==Cracker Objectives== |
− | + | Enumerate hosts, services, application versions | |
− | + | Elevate privileges and disguise presence | |
− | + | create a back door - a covert channel | |
− | =Defense Objectives= | + | ==Defense Objectives== |
− | + | IDS Intrusion detection system | |
− | + | Log Files - automated reporting system | |
− | + | Minimized access== | |
− | + | Update patches and firmware | |
− | =Hacker/Cracker tools= | + | ==Hacker/Cracker tools== |
+ | ===NetStumbler - Windows=== | ||
+ | scan 2.4 & 5 GHz frequency fro 802.11a, b & g ieee | ||
+ | ====reports==== | ||
+ | MAC address | ||
+ | SSID | ||
+ | Access Point Name | ||
+ | broadcast channel | ||
+ | vendor name | ||
+ | signal strength |
Revision as of 14:40, 4 December 2011
Wireless Security -------------------------------- Home Page user:scott Home-22 user:scott/22 Printers user:scott/23 Network user:scott/24 Troubleshoot user:scott/25 Virus Scan user:scott/26 WiFi Secure user:scott/26 Active Dir user:scott/29
Cracker Objectives
Enumerate hosts, services, application versions Elevate privileges and disguise presence create a back door - a covert channel
Defense Objectives
IDS Intrusion detection system Log Files - automated reporting system Minimized access== Update patches and firmware
Hacker/Cracker tools
NetStumbler - Windows
scan 2.4 & 5 GHz frequency fro 802.11a, b & g ieee
reports
MAC address SSID Access Point Name broadcast channel vendor name signal strength