{"id":37,"date":"2024-12-06T01:45:46","date_gmt":"2024-12-06T01:45:46","guid":{"rendered":"https:\/\/wp.odu.edu\/summer2017-interdisciplinary-studies\/?page_id=37"},"modified":"2024-12-07T01:03:42","modified_gmt":"2024-12-07T01:03:42","slug":"law","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/law\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"\n<p>Artifact #4<\/p>\n\n\n\n<p>Description: One tool I&#8217;ve learned to use and downloaded myself that is detrimental to penetration testers is Wireshark. Not only have I learned to actively capture a networks traffic, I can then also analyze the packets captured to find clues about one&#8217;s network like login information or any text if unencrypted, IP&#8217;s within the network and in communication, and the transfer or download of unwanted files. These can be done efficiently by filtering the specific protocols that these actions may occur with. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"552\" src=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-1024x552.png\" alt=\"\" class=\"wp-image-151\" style=\"width:774px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-1024x552.png 1024w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-300x162.png 300w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-768x414.png 768w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-1536x828.png 1536w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio-557x300.png 557w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/capture-for-portfolio.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Artifact #5<\/p>\n\n\n\n<p>Description: To practice my skills on passive and active reconnaissance as well as vulnerability exploitation I created as virtual machine for Kali Linux. Familiarizing and using applications like Metaspoitable, nmap, and John the Ripper. Successfully combining these to break into legacy target systems using Windows 7 and Windows XP to allow me as the hacker the privilege&#8217;s of the admin user.   <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"556\" src=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-1024x556.png\" alt=\"\" class=\"wp-image-152\" srcset=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-1024x556.png 1024w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-300x163.png 300w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-768x417.png 768w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-1536x834.png 1536w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio-553x300.png 553w, https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/vm-portfolio.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Artifact #6<\/p>\n\n\n\n<p>Description: In my Ethical Hacking and Penetration testing class (CYSE 450), I had to find an open device on the internet and then conduct passive reconnaissance to find known vulnerabilities. I then had to give a description on how the device is vulnerable and possible ways the vulnerability could be mitigated. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-content\/uploads\/sites\/37876\/2024\/12\/annotated-Assinment_1_Passive_Reconnaissance.pdf.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-Assinment_1_Passive_Reconnaissance.pdf.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artifact #4 Description: One tool I&#8217;ve learned to use and downloaded myself that is detrimental to penetration testers is Wireshark. Not only have I learned to actively capture a networks traffic, I can then also analyze the packets captured to find clues about one&#8217;s network like login information or any text if unencrypted, IP&#8217;s within&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/myeportfolioo\/law\/\">Read More<\/a><\/div>\n","protected":false},"author":27451,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/users\/27451"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":165,"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/pages\/37\/revisions\/165"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/myeportfolioo\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}