![]() ![]() Nmap, were successful in penetrating the server, but this could just as easily have been carried out by an external attacker, as the vulnerability assessment clearly collaborated this. Compromised computers within the network also became part of a botnet. Other exploits included the creation a backdoor to communicate with a remote server. The attacker was able to remotely log in to the server. The consequence of this was a network breach that created a number of new user accounts in the admin and user groups, exposed vulnerable ports the attacker could copy, insert and delete files and logs at will. The experiment demonstrated how the administrator password was easily compromised by an unauthorised user, using the Cain and Able tool. The attack phase consisted on the following steps:- scanning, enumeration and vulnerability assessment. A variety of attack tools were used to simulate an insider attack on the server. The work was carried out in a virtual environment using a Window 2003 Small Business Server and two computers running Windows XP operating systems. This research demonstrates how the computers within a network can be used to breach a server within the same network. Research has shown that cyber attacks are often carried by an employee within an organisation. The use of digital fingerprinting technologies has facilitated the collection of evidence to use in the prosecution of cyber criminals who have left behind vital evidence when compromising servers. With the number of cyber attacks on the increase this has resulted in the security of networks being severely diminished. The internet has placed a major part in the increase of cybercrime on computers and networks by making attack tools available to everyone. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |