Password protect the file as follows:In the Password field, enter the Confirm Password field, enter Hide Data.Select OK. Answer the questions.Ĭomplete this lab as follows: Encrypt the user data into the file to be shared as follows:In the search field on the taskbar, type OpenStego.Under Best match, select OpenStego.In the Message File field, select the ellipses at the end of the field.Select Open.In the Cover File field, select the ellipses at the end of the field.Select gear.png file.Select Open.In the Output Stego File field, select the ellipses at the end of the field.In the File name field, enter Open. Find the Administrator account's password. Open the LOG.txt file and inspect the contents. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Plug the keylogger into the consultant laptop's USB drive. Move the consultant laptop from the Shelf to the Workspace. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. After a week, the company executive lets you back into the IT Admin's office after hours again. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. Your company has completed the legal documents needed to protect you and the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |