![]() ![]() ![]() Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Plug the keylogger into the consultant laptop's USB drive. Move the consultant laptop from the Shelf to the Workspace. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. After a week, the company executive lets you back into the IT Admin's office after hours again. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. Your company has completed the legal documents needed to protect you and the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. 8.1.4 Analyze a USB keylogger attack The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |