Friday, May 10, 2019
Ethical Hacking Final Challenges Research Paper
Ethical Hacking Final Challenges - Research Paper Example because one of the vulnerabilities of MD5 is its possibility of resulting into collision attacks. The algorithm also gives room for any attacker to generate a collision. The practical abilities of such attacks results into the impersonation of the trusted roots CA by the attackers. The MD5 trustworthiness is reduced the hour an attacker posses the ability to construct forged entropy in various forms with the ability of ca exploitation package using MD5 (Simpson, 2010-03-17). All these underlying vulnerabilities are cause by a cryptographic primitive making the special exploitation scenarios vary largely depending on the form of data that is prone to attack and the validation of the software. Microsoft has though tried to issue specific patch for flame which does not though eliminate completely the vulnerabilities ca utilize by MD5 hence they recommend that every CA that still makes use of MD5 should stop with immediate ef fect and to transmigrate to better hash functions. Those with certificates signed by MD5 should see on how to replace them immediately. The CA should therefore insure that sensible cryptographic measures are used depending on the tasks they want performed in their respective organizations (Simpson, 2006). Challenge 2 MEMO TO Bob Kaikea FROM Network security Team DATE 20th February 2013 SUBJECT Port number and services that run on most networks A interface number in computer networking is largely the part of the addressing information that is employed in knowing who the senders and receivers and senders of messages within a network as used with TCP/IP connections (Simpson, 2010-03-17). The port numbers allow for the sharing of information by different applications on the same computer to share resources and they work like telephone extensions. The well know ports are an casing of Port 80 that which explains to us what a port really is describing it as a virtual data used by sof tware components to interact. Another is the DHCP which is the Dynamic Host Configuration protocol. The DHCP server listens on this port and allocates your link the properties it has requested, e.g. IP address, network mask, default gateway and DNS server. Both ports 20 and 21 are known as random ports. While 21 is known as the TCP and is well designed for file transfer protocol control, the port 20 is the active FTP type and is designed for the actual transfer of data. Ports 23, 25, 53 and one hundred ten are ports outside the range and they would be used to transfer actual data without the specified range. 23 is the Telnet, 25 acts for the simple mail transfer, 53 is the domain name saver and 110 acts as the dribble Office Protocol version 3 (Simpson, 2006). In analyzing the services currently running for the Alexander Rocco Corporation, the ports existence used must be keenly looked at to enhance the recovery of the ways to be used to curb the vulnerabilities. Challenge 3 Ethic s and honourableity most so in the computer milieu more or less revolves around the same thing that is ethics being a moral philosophy where one makes a moral choice and sticks to it. In our case it refers to the moral guidelines that an individual sticks to when using computers and computers networks including the encryption algorithms. It is unethical and therefore against the law to do the following when it comes to computers and computer networks. An individual should not deflower into using office computers to do personal work, one should never read
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.