Documentos de Académico
Documentos de Profesional
Documentos de Cultura
centr al queensland
univ er si ty
submitted by:
week 1
0.1.2 create a local user account
0.1.3 change the account type
0.1.7 create domain user account
0.1.8 disable a user account
0.1.9 reset the password
0.2.3 create a user
week 3
week 4
the passwords should be of 8 or more characters in length. each character that you add to
your password increases the protection by many times. the password1.doc contains the
password as a combination of letters, numbers. the greater the variety of characters
(includes symbols) that you have in your password, the harder it is to guess. the length of
the password is not an ideal, however combination of letters and numbers makes harder
to guess for hackers. the password1.doc strength is better when compared to
password2.doc and password3.doc, however it is not ideal one to choose.
the password for password2.doc is easy breakable. it contains the sequence numbers as
password. the sequence numbers and adjacent letters on keyboard do not make secure
passwords. the password2.doc is weakest one when compared to password1.doc and
password3.doc.
cois23001 network security
password3.doc password is the weakest. hackers use sophisticated tools that can rapidly
guess passwords that are based on words in multiple dictionaries, including words spelled
backwards, common misspellings, and substitutions. always avoid dictionary words in
any language, because they can be easily hacked by using dictionary
the second segment of the three way handshake is to establish a syn/ ack flags set. the
syn/ack flags are set through server. the above screen shot packet 2 synchronizes byte
count with the originator and acknowledge the original packet.
the above screenshot packet 3 shows the final segment of the three way
handshake with ack flag. the originator returns an "ack" which acknowledges the
packet the destination just sent him. the connection is now open between port
80 and port 50046 and ongoing communication between the originator and the
destination are permitted until one of them issues packets, or the connection
times out.
question 5
1. discuss how you would review the sequence of packets in the figure. what would you
look for?
the sequence of packets is reviewing the signatures of packets that attempt to access
the server, packet filtering rules and search for the correct three way hand shaking.
2. what kind of scan is involved?
the scan is involved to find the specific trojan scans.
3. what is the hacker attempting to locate?
the hacking start with a common scan of internet protocol address, they carry on looking
for specific ports, back doors, mac address and individual applications.
4. what is the source port being used by the hacker?
200.101.176.11 : 3322
200.101.176.11 : 3323
200.101.176.11 : 3324
200.101.176.11 : 3325
cois23001 network security