Need Help ?

Our Previous Samples

CYB 310: 2-1 Discussion: Inventing the Next Generation Network and Port Scanner ...

CYB 310:  2-1 Discussion: Inventing the Next Generation Network and Port Scanners

    
In your reading this week, you will explore multiple network and port scanners. If you could create the network or port scanner of your dreams, what aspects of the tools you read about this week would you include and why? Make sure you name your creative and groundbreaking new tool!

In your response posts, describe how you could use the new tools developed by your peers, and suggest a new feature for each tool.

 

Sample Post

Hello Everyone, 

I hope this week is treating you all well. As we delve deeper into the world of network and port scanning, I can not help but imagine the perfect scanner that would combine the best features of all the tools we have encountered. If I could create my dream scanner, I would call it "ZymNet"

ZymNet would be a powerhouse scanner with the following features:

  • Speed and Efficiency: ZymNet would incorporate the lightning fast scanning capabilities of tools like nmap, allowing for quick identification of active hosts and open ports on a network.
  • Versatility: It would support a wide range of scan types, including TCP, UDP, SYN and ACK scans, similar to nmap, to cater to different network environments and security needs.
  • Stealth and Evasion: ZymNet would excel at evading detection by intrusion Detection System (IDS) and firewalls, drawing inspiration from advanced scanners that employ techniques like packet fragmentation and source address spoofing.
  • Comprehensive OS and Service Detection: It would accurately identify operating systems and services running on target machines, providing valuable information for vulnerability assessment and penetration testing.
  • User Friendly Interface: Unlike some command line scanners, ZymNet would feature an intuitive graphical user interface (GUI) that makes it accessible to both novice and experienced users.
  • Customizable Reporting: It would generate detailed and customizable reports that can be tailored to specific audiences and purposes.
  • Integration with Other Tools: ZymNet would seamlessly integrate with other security tools, such as vulnerability scanners and exploitation frameworks, to streamline the security assessment process.

In essence ZymNet would be the ultimate all in one scanner that combines speed, versatility, accuracy and user friendliness. It would be the go to tools for network administrators, security professionals and ethical hackers alike.

 

Sample Reply

Hello,

Great work on conceptualizing ZymNet. It sounds like this would be a great tool for any offensive security specialist, especially as a starting point to begin an offensive operation. 

One thing that stood out to me about ZymNet was its user-friendly UI and customizable reporting. These features could make ZymNet a good fit for corporate pen-testing environments. A robust UI would help offensive teams to train new members. The GUI could also be helpful in tweaking and recreating steps within a particular attack. Lastly, the customizable reports could save significant time and make the lives of the team members much better. From what I have heard, offensive security teams can spend half of their time or more just writing reports. These reports are obviously extremely important (and ultimately what the client is paying for), but integrated assistance in generating reports could prove highly popular amongst red teams. 

One feature that could be added on to what you have outlined with ZymNet is a portable version of the software package that could be stored on a USB or similar drive and used in physical penetration tests. While not every test will have physical access to a client's hardware, the ability to scan for open ports within a network could be valuable when access allows for it. 

Thank you for the thorough post!

 


READ MORE >>

1-1 Discussion: Introduction and Networking Experience (CYB-310-18578-M01 Networ ...

 

CYB-310-18578-M01 Network Defense 2024 C-6

1-1 Discussion: Introduction and Networking Experience 

In your initial post, briefly introduce yourself.

Next you will consider your IT networking experience. We all experience network problems, either as a user or as a professional in the field. Provide an example of your personal or professional experience with networking, and describe a situation where you had to troubleshoot or resolve an issue. Include details about how you approached the problem. Feel free to draw on previous coursework for your examples.

In your response posts, what other techniques to solving the problems described by your peers could you suggest from your experience? Alternatively, what questions would you ask to help diagnose or solve the problem?

 


READ MORE >>

CJ 4440 Quizz #1: Week #2: October 21 - October 27, 2024 ...

CJ 4440 Quizz #1: Week #2: October 21 - October 27, 2024

Due Oct 27 at 11:59pm

Score for this attempt: 10 out of 10
Submitted Oct 26 at 2:43pm
This attempt took 11 minutes.


Question 1                                                  1 / 1 pts
1. The British government define terrorism as "any activity that involves an act that is dangerous to human life or potentially destructive of critical infrastructure or key resources; ..."

  •   True 
  •   False 

 
Question 2                                              1 / 1 pts
2. Based on your reading which of the government agency listed below define terrorism as "is intended to produce fear in someone other than the victim"?

A) Federal Bureau of Investigation (FBI)

B) U. S. Department of Defense (DOD)

C) U. S. Department of State

D) U. S. Department of Homeland Security (DHS)

 
 
Question 3                                                        1 / 1 pts
3. The USA Patriot Act was enacted with nearly partisan votes in both the Senate and House to provide law enforcement with new authority to assist detection and prevention of terrorism.

  •   True 
  •   False 

 
Question 4                                                 1 / 1 pts
4. Acts of violence are described as a logical progression of what steps?

A) Reasons, execution, and outcome

B) Systematic, execution, and immediate consequence

C) Organization of thought, execution, and outcome

D) Formation of intent, execution, and immediate consequence


 
Question 5                                                 1 / 1 pts
5. Law enforcement and Intelligence agencies are experiences most problems in the twenty-first century with detection, infiltration, and prevention of what type of terrorist?

A) Jihadist

B) State-sponsor

C) Lone Wolf

D) Islamic Jihad

 
Question 6                                                           1 / 1 pts
6. The 1993 bombing of the World Trade Center was the first significant terrorist act in the United States, unlike worldwide terrorism activities in the twenty-first century.

  •   True 
  •   False 

 
Question 7                                                       1 / 1 pts
7. Based on required reading, which violent acts are defined as terrorist incidents?

  • A) 1941 Attack on Pearl Harbor, 1995 Oklahoma City Bombing, and 2000 Bombing of the USS Cole
  • B) 1995 Oklahoma City Bombing & 2000 Bombing of the USS Cole
  • C) 1941 Attack on Pearl Harbor & 2000 Bombing of the USS Cole
  • D) 1941 Attack on Pearl Harbor & 1995 Oklahoma City Bombing


 
Question 8                                              1 / 1 pts
8. Under Homeland Security Presidential Directive 6, the Department of Homeland Security Secretary established Terrorist Screening Centers (TSCs) in September 2003 to consolidate the watch list for the lawful use of terrorist information in screening processes.

  •   True 
  •   False 

 
Question 9                                                           1 / 1 pts
9. Identified reasons for RCMP and CSIS joint investigation failures that span over twenty years regarding the bombing of Air India Flight 182, the worst act of terrorism in Canadian history (Spindlove & Simensen, 2018).

  • A) Lack of intelligence and investigative tools
  • B) Interference and management of the investigation
  • C) Lack of investigative tools
  • D) Lack of intelligence tools


 
Question 10                                                                      1 / 1 pts
10. Which of the following factors did not contribute to Francois "Papa Duvalier" having Haiti's most prolonged leadership regime?

  • A) Decrease the illiteracy rate of Haiti's population to below 70 percent
  • B) Use of Secret Police to form a brutal regime
  • C) Support of the Haitian Army
  • D) Alleged supernatural powers from the practice of Voodoo

 

 


READ MORE >>
WhatsApp