{"id":341,"date":"2025-03-02T22:24:09","date_gmt":"2025-03-02T22:24:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=341"},"modified":"2025-03-02T22:24:12","modified_gmt":"2025-03-02T22:24:12","slug":"homework-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-8\/","title":{"rendered":"Homework 8"},"content":{"rendered":"\n<ol>\n<li>What were some of the challenges Jeremy encountered during this penetration testing and social engineering process?<\/li>\n<\/ol>\n\n\n\n<p>\u00a0One of the challenges that Jeremy encountered was making sure that he didn\u2019t raise suspicion when he was attempting to hack into the network. Another challenge when he was doing penetration testing was that he wasn\u2019t able to crack passwords using Hashcat. His computer had a log collector so if he were to do anything suspicious it would have been logged and he would have been caught.\u00a0<\/p>\n\n\n\n<p>2. What were some of the technical techniques that Jeremy from Marketing used to manipulate the company\u2019s network?<\/p>\n\n\n\n<p>\u00a0He used Responder to get hashes when people logged into their computers. He used Hashcat to attempt to get matches to find passwords. He also used Metasploit and he managed to get some passwords until his connection ended, He also used Wireshark which allowed him to determine how he would try to exploit the network.<\/p>\n\n\n\n<p>3. What were some of the social engineering techniques Jeremy used on the company and its employees?<\/p>\n\n\n\n<p>One of the social engineering techniques Jeremy used was when he told the finance lady that he was IT, and he was going to do updates on her computer, so he could put malware on her computer. Another social engineering technique that Jeremy used on the employees was when he managed to bypass MFA by having Jane from accounting give him the pin for him to get into Citrix.\u00a0<\/p>\n\n\n\n<p>4. How did the company respond to the attack and what measures did they take to prevent similar attacks in the future?<\/p>\n\n\n\n<p>\u00a0The computer had a Factor Authentication on every application, which would make it too difficult for a hacker to infiltrate a network. The logging on the computer made it easy for hackers like Tinker to be caught. The company also had strong passwords, which made them hard to crack, and the local admin had limited access when Tinker was trying to access certain areas of the network.<\/p>\n\n\n\n<p>5. What lessons can we learn from the story of Jeremy from Marketing about the importance of cybersecurity training and awareness for employees?<\/p>\n\n\n\n<p>\u00a0The lesson that we can learn from this story is that training employees about cybersecurity is important, like having strong passwords and having two-factor authentication. Also, we can learn not to give PINs over the phone because employees need to be aware and not give sensitive information like a PIN to a random person.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0One of the challenges that Jeremy encountered was making sure that he didn\u2019t raise suspicion when he was attempting to hack into the network. Another challenge when he was doing penetration testing was that he wasn\u2019t able to crack passwords using Hashcat. His computer had a log collector so if he were to do anything &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/02\/homework-8\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/341"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/341\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/341\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}