Information Gathering

You as a team member in HackingTheWorld has been asked to collect information about one target of your choice. You have been asked to provide all valuable information regarding attacking this target. Write a full solution report that includes the following: – Target name (e.g. www.siemens.com, Etisalat, ebay, …etc) – List all domains and IP address of this target – List all possible email addresses of the target – Which of the retrieved IP’s is up and which is down – Header identities (Web server information) You need to clearly explain which tools you have used to gather these information and provide screenshots accordingly. Case 2: Scanning Task 2.1 (30 Marks) One of the Labs we had is creating a malware on the victim WinXP with a hidden NetCat command that retrieve the MS-DOS terminal onto the attacker linux kali. The basic idea was running a nc command that listen on a specific port on windows where Kali establish a connection at the same port and sniffs. Now you have been asked to write a small virus that shutdown the victim machine after 15 seconds when clicking on it. – Explain exactly each step on both machines – Which commands and tools have you used – Provide screenshots Task 2.2 (30 Marks) The HCT College in AAMC is using wireless networks for almost all devices and being part of this, you have an idea to scan and collect all up hosts and used ports of each host. For this mission, you need to install Zenmap tool on your laptop and connect to the wireless lan. Do an intensive scan for the WLAN network on all AAMC. – List all hosts IP addresses and the corresponding running services – What is the exact parameters that you have used in Zenmap (provide screenshot) – Show the topology of detected hosts in the WLAN – If you need to send only 512 byte 5 times from port 55 to port 169 on one of the detected IP address, which tool should you use and what is the exact command that accomplish this mission – Which tool on Kali is used to crack the WLAN security, explain its functionality and provide a test scenario. Task 2.3 (20 marks) Download and install the Damn Vulnerable Linux (DVL) as a virtual machine to your VMware. Download link: http://osdn.net/projects/sfnet_virtualhacking/downloads/os/dvl/DVL_1.5_Infectious_D isease.iso/ Use the username root and password toor to login. Perform the following using Kali: for all tasks you should provide screenshots and explanation. – What is the IP address of DVL machine? – Do fingerprinting to retrieve the operating system information on DVL – List only closed ports in the DVL – If you want to send 20000 packets with RST flags from source port 555 and these packet should reach the port 26 on the DVL machine. What is the command to perform this task?