Networking Fundamentals: Rocking your Network

RockStar Corp has recently built a new office in Hollywood, California. You are tasked with completing a network vulnerability assessment of the office.
You will complete several steps in order to analyze the Hollywood network and then provide RockStar Corp a summary of your findings.
RockStar Corp is also concerned that a hacker may have infiltrated their Hollywood office. You will need to determine if there is anything suspicious in your findings.
FILES REQUIRED
RockStar Corp has provided you with:

A list of their network assets: Rock Star Server List
Instructions to scan their network.
YOUR GOAL
You will follow instructions to work through four phases of the network assessment. For each phase, include the following:

The steps and commands used to complete the tasks.
A summary of your findings for each testing phase.
Any network vulnerabilities discovered.
Findings associated with a hacker.
Recommended mitigation strategy.
Document the OSI layer where the findings were found.
TOPICS COVERED IN YOUR ASSIGNMENT
Subnetting
CIDR
IP Addresses
fping
OSI Model and OSI Layers
Protocols
Ports
Wireshark
PCAP Analysis
DNS
HTTP
ARP
Syn Scan
TCP
nslookup
Network Vulnerability Assessments
Network Vulnerability Mitigation
NETWORK VULNERABILITY ASSESSMENT INSTRUCTIONS
Please note that you will be using your Vagrant virtual machine for this homework.

PHASE 1: “I’D LIKE TO TEACH THE WORLD TO PING”
You have been provided a list of network assets belonging to RockStar Corp. Use fping to ping the network assets for only the Hollywood office.

Determine the IPs for the Hollywood office and run fping against the IP ranges in order to determine which IP is accepting connections.
RockStar Corp doesn’t want any of their servers, even if they are up, indicating that they are accepting connections.
Use fping and ignore any results that say “Request timed out”.
If any of the IP addresses send back a Reply, enter Ctrl+C to stop sending requests.
Create a summary file in a word document that lists out the fping command used, as well as a summary of the results.
Your summary should determine which IPs are accepting connections and which are not.
Also indicate at which OSI layer your findings are found.
PHASE 2: “SOME SYN FOR NOTHIN`”
With the IP(s) found from Phase 1, determine which ports are open:

You will run a SYN SCAN against the IP accepting connections. See SYN SCAN Instructions below.
Using the results of the SYN SCAN, determine which ports are accepting connections.
Add these findings to the summary and be sure to indicate at which OSI layer your findings were found.
SYN SCAN INSTRUCTIONS
What is Nmap?

Nmap is a free networking scanning tool available for Linux distributions.
Security professionals use Nmap to determine the devices running on a network, as well as finding open ports to determine potential security vulnerabilities.
Nmap has many capabilities and commands that can be run. Here is a cheat sheet for reference: https://www.stationx.net/nmap-cheat-sheet/.
For this activity, we will specifically focus on the Nmap capability of running a SYN SCAN.

We have already covered that a SYN SCAN is an automated method to check for the states of ports on a network, Nmap is simply a tool that can automate this task.
To run a SYN SCAN:

Open up the terminal within your Linux machine.
The command to run a SYN SCAN is nmap -sS .
For example, if you wanted to run a SYN SCAN against the server IP of 74.207.244.221, you would run nmap -sS 74.207.244.221 and press enter.
This will scan the most common 1000 ports.
After this runs for several minutes, it should return a similar result that depicts the state of the ports on that server:
Starting Nmap 7.70 ( https://nmap.org ) at 2019-08-14 11:51 EDT
Nmap scan report for li86-221.members.linode.com (74.207.244.221)
Host is up (1.4s latency).
Not shown: 988 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
110/tcp open pop3
113/tcp filtered ident
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
143/tcp open imap
445/tcp filtered microsoft-ds
465/tcp open smtps
587/tcp open submission
993/tcp open imaps
995/tcp open pop3s
The results show the port number / TCP / UDP , the state of the port, and the service / protocol for the ports that are either open or filtered (stopped by a firewall).
Closed ports are not shown, indicated on the line: Not shown: 988 closed ports.
For the purpose of this exercise, document which ports are open on the RockStar Corp server, and which OSI layer SYN scans run on.
PHASE 3: “I FEEL A DNS CHANGE COMIN’ ON”
With your findings from Phase 2, determine if you can access the server that is accepting connections.

RockStar typically uses the same default username and password for most of their servers, so try this first:
Username: jimi
Password: hendrix
Try to figure out which port/service would be used for remote system administration, and then using these credentials, attempt to log into the IP that responded to pings from Phase 1.
RockStar Corp recently reported that they are unable to access rollingstone.com in the Hollywood office. Sometimes when they try to access the website, a different, unusual website comes up.

While logged into the RockStar server from the previous step, determine if something was modified on this system that might affect viewing rollingstone.com within the browser. When you successfully find the configuration file, record the entry that is set to rollingstone.com.
Terminate your ssh session to the rollingstone server, and use nslookup to determine the real domain of the IP address you found from the previous step.
Note: nslookup is a command line utility that can work in Windows or Linux Systems. It is designed to query Domain Name System records. You can use PowerShell or MacOS/Linux terminal to run nslookup.
To run nslookup, simply enter the following on the command line:nslookup to find the domain associated to an IP addressORnslookup to find the IP address associated to a domain
You’ll know you found the right domain if it begins with media-.
Add your findings to your summary and be sure to indicate which OSI layer they were found on.
PHASE 4: “SHARP DRESSED MAN”
Within the RockStar server that you SSH’d into, and in the same directory as the configuration file from Phase 3, the hacker left a note as to where he stored away some packet captures.

View the file to find where to recover the packet captures.
These are packets that were captured from the activity in the Hollywood Office.
Use Wireshark to analyze this pcap file and determine if there was any suspicious activity that could be attributed to a hacker.
Hint: Focus on the ARP and HTTP protocols. Recall the different types of HTTP request methods and be sure to thoroughly examine the contents of these packets.
Add your findings in your summary and be sure to indicate at which OSI layer they were found.
YOUR SUBMISSION: “ITS THE END OF THE ASSESSMENT AS WE KNOW IT, AND I FEEL FINE”
GUIDELINES FOR YOUR SUBMISSION:
Provide the following for each phase:

List the steps and commands used to complete the tasks.
List any vulnerabilities discovered.
List any findings associated to a hacker.
Document the mitigation recommendations to protect against the discovered vulnerabilities.
Document the OSI layer where the findings were found.
For example:

Phase 1

Determined the IP ranges to scan were 1.1.1.1 and 2.2.2.2, then ran fping against 1.1.1.1 and 2.2.2.2.
Used the following commands to run fping:
fping 1.1.1.1
Determined a potential vulnerability that IP 1.1.1.1 is responding.
Since RockStar Corp doesn’t want to respond to any requests, this is a vulnerability.
Recommend to restrict allowing ICMP echo requests against IP 1.1.1.1 to prevent successful responses from PING requests.
This occurred on the network layer as Ping uses IP addresses and IPs are used on the Network Layer.

Sample Solution

The post Networking Fundamentals: Rocking your Network appeared first on homework handlers.

Epidemiology of Health Promotion After completing this unit, you should be able to:

11/22/17, 7’59 PMSample Content Topic

Page 1 of 1file:///Users/madeline/Downloads/Unit%206%20Overview%20and%20Outcomes.html

Epidemiology of Health Promotion After completing this unit, you should be able to:

Discuss the core functions of epidemiology. Explain ways to evaluate screening methodologies and outcome effectiveness. Determine the health promotion needs of a population by interpreting epidemiological data including health disparity data.

Course Outcome(s) practiced in this unit:

MN505-3: Assess health promotion and illness prevention risk factors in a multicultural context.

PC-4.3: Apply concepts of multiculturalism and diversity to become an agent of change.

Epidemiology Core Functions

There are six core epidemiological functions: surveillance, field investigations, analytical studies, evaluation, linkages, and policy. Although most healthcare professionals are familiar with the functions of health surveillance, field investigation, and analytic studies, and the investigation of health problems, they may be less aware of the core functions of linkages and policy. Linkages entail collaboration of agencies, organizations, governments and healthcare professionals. Epidemiological work is characterized by interprofessional and interagency collaboration Epidemiologists also play a key role in providing the data to help focus the development of evidence-based health policy at all levels, from developing policies for a single hospital unit to the development of national and international health policy. As a masters or doctoral prepared nurse, you will play an important role in providing linkages and advocating for evidence-based policy changes.

The Centers for Disease Control and Prevention (CDC) is the organization charged with coordinating epidemiological work in the United States. The mission of the CDC is to protect the health of the nation. The CDC is one of the most important sources of health information and resources for healthcare professionals and consumers and one of the leading causes of health-related statistics.

There are a number of statistics used in epidemiology to describe health status, quantify the extent of disease, and estimate the risk for developing disease or injury. It is essential that nurses be able to locate and interpret these statistics because this information is used to plan and evaluate health services and guide health policy. The most widely used health statistics are morbidity, mortality, and natality statistics. The definitions and uses of these statistics are further examined in this unit.

 

unit 6 class 505

The post Epidemiology of Health Promotion After completing this unit, you should be able to: appeared first on homework handlers.

Discuss (in about 2-3 pages) the advantage and disadvantage of the following hospital payment systems on cost containment and provider behavior:

Part I – Paying for Hospital Services

Discuss (in about 2-3 pages) the advantage and disadvantage of the following hospital payment systems on cost containment and provider behavior:

  • Fee-for-service
  • Per diem
  • The DRG-based payment system (i.e., Medicare’s Inpatient Prospective Payment System)
  • Capitation
    Part II – Paying for Physician Services
    Using the background materials and the information you find from the literature and on the Internet, respond (in about 2-3 pages) to the following questions:

1.  Discuss the difference in Medicare payment methods for outpatient services and physician services.

2.  Discuss the difference between bundled payments and global payments.

The post Discuss (in about 2-3 pages) the advantage and disadvantage of the following hospital payment systems on cost containment and provider behavior: appeared first on homework handlers.

Simulating Osmotic Pressure

Moreover, the title of your report should be somewhat descriptive, meaning you will need to briefly describe what has occurred during your experiment. For example, the effects of solute concentration on osmosis. Moreover, the abstract will summarize the lab report in entirety, thus a sentence or two should be used to brief the reader on relevant information within the report (ex. background info. on osmosis, purpose, results, etc.). Next is the introduction which should provide the reader with background information (citations) supportive material about osmosis. This section should also include the purpose and hypothesis. The materials and methods should follow the introduction and should detail the steps of the lab experiment. Please note this section as well as the others should be written in past tense and third person. Following the materials and methods should be the results area where you will provide a written account of the results and a table of results. The discussion comes after the results section, and in this area of the report you will need to begin by stating rather the hypothesis was supported or not supported. Additionally, you will need to explain the results in this section of the report. Finally, the reference page lists the sources that you have cited in the paper.