Scene 4
Ethical Hacking Case 2B
This material was developed with funding from the National Science Foundation under Grant # DUE 1601612
1/8
Test
Back
Next
Restart
Ethical Hacking Case 2B
2/8
You are an ethical hacker who has been hired by a company to create a report for them about what you can learn about the company from passive reconnaissance and footprinting as well as identifying an exploit, encryption, and use of cookies, on their website. You will need to investigate the scene to find pieces of evidence and clues to assist you in completing your report. You will need to use your problem solving skills, information technology knowledge, and perhaps a bit of intuition to put the pieces of this mysterious puzzle together. To solve the crime and close the case file type in the missing bits of information.
ENTER
x
Done
Username:  Password: 
Netcraft | What’s that site running?
Example: www.netcraft.com
Congratulations! You completed your report.
Element with Audio HTML
   Resources
   Report Checklist
TIP #2 As you find clues they will be added to your Resources folder.
!
Your quest is to find a fisherman's chosen brain. Only one brain was chosen. A folded leaf made from pressed trees  contains the map. The folded leaf lives as a barnacle under a tapestry that warms the wood. Find a folded leaf. Look inside. Find your map.
M
G
A
E
I
D
Q
K
J
B
Y
V
X
C
F
P
N
Z
U
O
R
S
L
H
W
T
Y
www.apple.com
Command Prompt
1
Microsoft Windows [Version 10.0.18362.356] (c) 2019 Microsoft Corporation. All right reserved. C:\Users\mia>
   Case Folder
Ethical Hacking
In the Case Folder under #3 Assigned Task, write an email as if you were the hacker. Use all the knowledge you have and direct users to the site.
Try Again!
Ayk muumrk ngiqotm zu mkz znk vgyycuxj lux skxskirky@msgor.ius zu uvkt znk ruiqkj hud.
Decrypt the message and type it in the space below.  Then click the submit button.
That’s correct!
www.aple.com
2
192.168.1.152
TIP #1 Click on the Report Checklist to fill in the answers as you find the clues.
When you have figured out the items to enter in the report checklist, enter them here and they will be saved.
Linux
#3: Web Server OS
#6: View cookies used on site
sha256RSA
#1: Client
#7: Exploit
#5: Encryption used on site
Amazon Technologies
#4: Complete Port Scan
#2: Host of Client Site
[x]
apple45 gT451*
Search for port scan tool
Downloading
3
6
4
7
5