Pretend you are kevin mitnick the greatest social engineer


1. Pretend you are Kevin Mitnick (the greatest social engineer) how would you use social engineering techniques to gather intelligence on a company's network? Be specific, what techniques would you use to gather what information?

2. What file permissions would the group users have on this file?

a. -rwxrw-r-- 1 Shania users 3072 Nov 3 19:05 badwords

3. Explain what this command does, include the explaination for all the switch options.

a. tar -xzvf perl-5.8.1.tar.gz

4. Describe what this device name means /dev/sdb2 ?

5. Explain in detail what this command does?

a. mount -t msdos /dev/fd1 /mnt/floppy

6. Explain what this command does?

a. date;echo The world is my oyster > NoitsNot;ls |grep N.*;date

7. What does this command do? Explain in detail including switches.

a. ps -ef

8. What does this command do?

a. echo date ; echo date >> logfile.out

9. What is a package manager? What does it do? Why would you want to use one verse just compiling a tarball?

Request for Solution File

Ask an Expert for Answer!!
Operating System: Pretend you are kevin mitnick the greatest social engineer
Reference No:- TGS01488456

Expected delivery within 24 Hours