SEC 420 WEEK 5 LAB ASSIGNMENT 4 LATEST STRAYER

admin   August 6, 2018   Comments Off on SEC 420 WEEK 5 LAB ASSIGNMENT 4 LATEST STRAYER

SEC 420 WEEK 5 LAB ASSIGNMENT 4 LATEST STRAYER

Visit Below Link, To Download This Course:

https://www.tutorialsservice.com/product/sec-420-week-5-lab-assignment-4-latest-strayer/

 

SEC 420 Week 5 Lab Assignment 4 Latest-Strayer

SEC420

SEC 420 Week 5 Lab Assignment 4 Latest-Strayer

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Lab Assignments

Submit each lab based on the following:

  1. Log into the EC-Council iLab environment.
  2. Complete the weekly lab assignment described below using EC-Council iLab.
  3. Submit the screenshots for the steps specified in each lab assignment. Go to http://www.take-a-screenshot.org/ if you need a tutorial on taking a screenshot.
  4. Write a short answer response in good paragraphs in Word along with the assignment submission link to the following:
    1. Summarize the technical experiences in completing the lab assignment.
    2. Identify the commands that were of greatest benefit to you.
    3. Provide general comments on the overall lab assignment experience.
      Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points may be deducted for poor writing.

Lab Assignment 4

Due Week 5 and worth 59 points

Complete the following EC-Council Labs.

Note: Labs contain deliverables that are partially derived from the following course required textbook: EC-Council Press. (2017). Ethical Hacking and Countermeasures: Attack Phases (2nd ed.). Cengage Learning.

Lab Version Module Title Location Lab #: Title Deliverable(s) for Submission
Strayer
SEC 420
(CEH v9)
System Hacking iLab
Module
5
Lab 5 (Exercise V): “Dumping and Cracking SAM Hashes to Extract Plaintext Passwords.”
  1. Screenshot after Step 23
Lab 6 (Exercise III): “Auditing System Passwords Using L0phtCrack.”
  1. Screenshot after Step 20
  2. Textbook: Attack Phases – Chapter 5: Questions 1-2
Lab 7 (Exercise XV): “Viewing, Enabling, and Clearing the Auditing Policy Using Auditpol.”
  1. Screenshot after Step 8

Grading for this lab assignment will be based on the following rubric.
Click here to view the grading rubric.