Assignment 4

docx

School

CUNY New York City College of Technology *

*We aren’t endorsed by this school

Course

4710

Subject

Electrical Engineering

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by HighnessRosePigeon29

Report
Assignment 4 Finish both Part A and Part B (Individual work, not a group) Part A -- Nping tool: understand the spoofing attacks (Part 2) We continue the spoofing attacks from previous assignment. 1. If you use Windows , do the following: On Dos command, run the command “nping --source-mac 00:01:01:01:01:08 --tcp -p 80 scanme.nmap.org” This command sets the spoofed source MAC (physical) address as 00:01:01:01:01:08, and it sends the TCP packet to the http port on target. Use Wireshark to verify the source MAC address spoofed (in Ethernet layer). See below. (You may enlarge the picture to see clearly). Hint : you should start the capture packets on Wireshark first, then run the Dos command, after the command, stop the capture on Wireshark.
2. If you use Mac , do the following: You should use Zenmap. The command is: nmap -Pn -e en0 --spoof-mac 00:01:01:01:01:08 scanme.nmap.org See the screenshot below (you can enlarge it).
Hint : you should start the capture packets on Wireshark first, then run the command on Zenmap, then stop the capture on Wireshark. Search the IP 45.33.32.156 (which is scanme.nmap.org). 3. Your task: Repeat the above steps, make sure you can follow them without an issue. If no error, continue, otherwise, let me know. Follow the instructions above and set the spoofed source MAC as 00:02:02:02:02:02. You provide screen shots of both nping command (or Zenmap) and Wireshark, which shows the spoofed MAC address as 00:02:02:02:02:02. (note, two screen shots) Part B --- Read the Alert “Ransomware Awareness for Holidays and Weekends” by FBI and CISA https://us-cert.cisa.gov/ncas/alerts/aa21-243a Write ppt slides for presentation (only ppt slides are needed). The 1 st slide should be the Title and your name. The 2 nd should be Summary or Abstract (either one). The 3 rd slide should be the section “ 1. Threat Overview ”, it contains two subsections. Each subsection contains 1-2 slides. For example, “ 1.1 Recent holiday Targeting ”, etc. The 2 nd section heading should be “ 2. Threat Hunting ”. It has several subsections, each contains 1 slide. Use the subsection #s 2.1, 2.2, … for each subsection.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
And so on… (Do not include the “Additional Resources” and “Contact Info” from the article into your slides.) You add the last section “ Conclusion ”. And the last slide should be “ References ”, it contains this article as the reference, use APA format.