Research Paper, Computer sciences and Information technology

Research Paper, Computer sciences and Information technology

Cain and Abel product review

Project description
Practical Assignment:
(Note: You need to use a tool that is different from the one you used for assignment 2.)
General Description:
This practical assignment is intended for you to get familiar with some of the current security tools. These tools are powerful and are widely used in the security community. You may find some of the tools useful in protecting your own computer as well as computing resources within your organization. Special attention should be paid in choosing some of the tools and instructions should be followed.
1)Select a tool from Top 100 Network Security Tools (http://sectools.org/). The use of an open-source tool is highly encouraged.
I choose Cain and Abel
Cain and Abel
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.
http://www.oxid.it/cain.html
http://sectools.org/tool/cain/

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organizations security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organizations regulations, procedures, policies, and/or local, state and federal laws.
3) Follow the instructions to configure and run the tool you chose.
4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).
a) What is the functionality of the tool?
b) What is the actual running environment (software and hardware) of the tool?
c) How will you evaluate the tool based on your own experience?
d) In what aspects could the tool be improved?

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

Leave a Comment

Your email address will not be published. Required fields are marked *

Our customer support team is here to answer your questions. Ask us anything!