Walker, a security team member at an organization, was instructed to check if a deployed cloud service is working as expected. He performed an independent examination of cloud service controls to verify adherence to standards through a review of objective evidence. Further, Walker evaluated the services provided by the CSP regarding security controls, privacy impact, and performance.
Identify the role played by Walker in the above scenario.
Calvin spotted blazing flames originating from a physical file storage location in his organization because of a Short circuit. In response to the incident, he used a fire suppression system that helped curb the incident in the initial stage and prevented it from spreading over a large are
a. Which of the following firefighting systems did Calvin use in this scenario?
Fire extinguisher is the firefighting system that Calvin used in this scenario. A firefighting system is a system that detects and suppresses fire in a physical location or environment. A firefighting system can consist of various components, such as sensors, alarms, sprinklers, extinguishers, etc. A firefighting system can use various agents or substances to suppress fire, such as water, foam, gas, powder, etc. A fire extinguisher is a portable device that contains an agent or substance that can be sprayed or discharged onto a fire to extinguish it . A fire extinguisher can be used to curb fire in the initial stage and prevent it from spreading over a large area . In the scenario, Calvin spotted blazing flames originating from a physical file storage location in his organization because of a short circuit. In response to the incident, he used a fire suppression system that helped curb the incident in the initial stage and prevented it from spreading over a large area. This means that he used a fire extinguisher for this purpose. A fire detection system is a system that detects the presence of fire by sensing its characteristics, such as smoke, heat, flame, etc., and alerts the occupants or authorities about it . A sprinkler system is a system that consists of pipes and sprinkler heads that release water onto a fire when activated by heat or smoke. A smoke detector is a device that senses smoke and emits an audible or visual signal to warn about fire.
A John-the-Ripper hash dump of an FTP server's login credentials is stored as "target-file" on the Desktop of Attacker Machine-2. Crack the password hashes in the file to recover the login credentials of the FTP server. The FTP root directory hosts an exploit file. Read the exploit file and enter the name of the exploit's author as the answer. Hint: Not all the credentials will give access to the FTP. (Practical Question)
John-the-Ripper Usage:
John-the-Ripper is a popular open-source password cracking tool used to detect weak passwords. It works by performing dictionary attacks and brute force attacks on password hashes.
Cracking the Hashes:
Load the hash file into John-the-Ripper using the command:
bash
Copy code
john target-file
John will then attempt to crack the passwords using its internal mechanisms.
Accessing the FTP Server:
Once the hashes are cracked, use the recovered credentials to log in to the FTP server. Not all credentials may be valid, so try each until successful access is gained.
Reading the Exploit File:
Navigate to the FTP root directory and locate the exploit file. Use a command like cat to read its contents:
cat exploit-file
The content of the file will include the author's name, which is 'nullsecurlty' in this scenario.
Shawn, a forensic officer, was appointed to investigate a crime scene that had occurred at a coffee shop. As a part of investigation, Shawn collected the mobile device from the victim, which may contain potential evidence to identify the culprits.
Which option best points must Shawn follow while preserving the digital evidence? (Choose three.)
Turn the device ON if it is OFF, do not leave the device as it is if it is ON, and make sure that the device is charged are some of the points that Shawn must follow while preserving the digital evidence in the above scenario. Digital evidence is any information or data stored or transmitted in digital form that can be used in a legal proceeding or investigation. Digital evidence can be found on various devices, such as computers, mobile phones, tablets, etc. Preserving digital evidence is a crucial step in forensic investigation that involves protecting and maintaining the integrity and authenticity of digital evidence from any alteration or damage. Some of the points that Shawn must follow while preserving digital evidence are:
Turn the device ON if it is OFF: If the device is OFF, Shawn must turn it ON to prevent any data loss or encryption that may occur when the device is powered off. Shawn must also document any password or PIN required to unlock or access the device.
Do not leave the device as it is if it is ON: If the device is ON, Shawn must not leave it as it is or use it for any purpose other than preserving digital evidence. Shawn must also disable any network connections or communication features on the device, such as Wi-Fi, Bluetooth, cellular data, etc., to prevent any remote access or deletion of data by unauthorized parties.
Make sure that the device is charged: Shawn must ensure that the device has enough battery power to prevent any data loss or corruption that may occur due to sudden shutdown or low battery. Shawn must also use a write blocker or a Faraday bag to isolate the device from any external interference or signals.
Never record the screen display of the device is not a point that Shawn must follow while preserving digital evidence. On contrary, Shawn should record or photograph the screen display of the device to capture any relevant information or messages that may appear on the screen. Recording or photographing the screen display of the device can also help document any changes or actions performed on the device during preservation.
RAT has been setup in one of the machines connected to the network to steal the important Sensitive corporate docs located on Desktop of the server, further investigation revealed the IP address of the server 20.20.10.26. Initiate a remote connection using thief client and determine the number of files present in the folder.
Hint: Thief folder is located at: Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.
3 is the number of files present in the folder in the above scenario. A RAT (Remote Access Trojan) is a type of malware that allows an attacker to remotely access and control a compromised system or network. A RAT can be used to steal sensitive data, spy on user activity, execute commands, install other malware, etc. To initiate a remote connection using thief client, one has to follow these steps:
Navigate to the thief folder located at Z:\CCT-Tools\CCT Module 01 Information Security Threats and Vulnerabilities\Remote Access Trojans (RAT)\Thief of Attacker Machine-1.
Double-click on thief.exe file to launch thief client.
Enter 20.20.10.26 as IP address of server.
Enter 1234 as port number.
Click on Connect button.
After establishing connection with server, click on Browse button.
Navigate to Desktop folder on server.
Count number of files present in folder.
The number of files present in folder is 3, which are:
Sensitive corporate docs.docx
Sensitive corporate docs.pdf
Sensitive corporate docs.txt
Tammi
10 days agoLuther
17 days agoApolonia
25 days agoLeonor
1 month agoVeronica
1 month agoCrissy
2 months agoMan
2 months agoFiliberto
2 months agoLayla
2 months agoElinore
3 months agoJolanda
3 months agoShanda
3 months agoLauran
4 months agoMona
4 months agoNu
4 months agoLisha
4 months agoVeronique
5 months agoMelodie
5 months agoJesusita
5 months agoParis
5 months agoGregoria
6 months agoIn
6 months agoFletcher
6 months agoJackie
6 months agoNicolette
7 months agoGlory
7 months agoBonita
7 months agoMelita
7 months agoSherell
7 months agoAmos
7 months agoDaniela
7 months agoRicki
9 months agoTamra
9 months agoCathern
10 months agoChantell
10 months agoDaniel
12 months agoZachary
1 year agoElke
1 year agoTimothy
1 year agoRoosevelt
1 year agoMelvin
1 year agoLatosha
1 year agoAlverta
1 year agoSabina
1 year agoDelsie
1 year agoSheldon
1 year agoHershel
1 year agoLillian
1 year agoLigia
1 year agoRonnie
1 year agoLawana
1 year agoDoyle
1 year agoKing
1 year agoEmeline
1 year agoAlverta
1 year agoTimothy
1 year agoXuan
1 year agoLennie
1 year agoPok
2 years agoDeja
2 years agoRoxanne
2 years agoMaurine
2 years agoTomas
2 years agoCharlie
2 years agoAzalee
2 years agoBarrie
2 years agoJulie
2 years agoGladys
2 years agoShasta
2 years agoGeorgiann
2 years agoAsuncion
2 years agoBernardine
2 years agoAdaline
2 years agoMargurite
2 years agoGladys
2 years ago